[Learning Module] Know Basics Metasploit Framework - CyberNews404

CyberNews404 is an online technology portal that provides information about the world of cyber news, cyber technology, tech news, tips & trik, tutorial etc. compelling content that educates the public and also provides unique entertainment.

Post Top Ad

[Learning Module] Know Basics Metasploit Framework

[Learning Module] Know Basics Metasploit Framework

Share This
Metasploit is a free tool as well as open source software with many contributors from the security community.

CyberNews404 - Before entering this material, I suggest you read the previous material "Basic Absolute For Penetration Testing". On this occasion, I will discuss the Basics of the Metasploit Framework. Come on, check it!

When you first get to know the Metasploit Framework (MSF) for the first time, you may be overwhelmed. Either in terms of interface, utility options, variables, and modules. In this material, we will focus on the basics of Metasploit Framework which will help to understand the outline.

I will review some basic penetration testing terminology. Then briefly show the various user interfaces that Metasploit serves. Metasploit itself is a free tool as well as open source software with many contributors from the security community. In addition to being free, Metasploit also provides a commercial version.

When first using Metasploit, it's important to not fixate on the latest exploits. Instead, focus first on how Metasploit works and what commands are used to make exploitation possible.

Terminology

1. Exploit

Exploiting is one method used by an attacker or pentester. In this method, we take advantage of system defects, applications, or services. Attackers exploit to attack the system in a way that can deliver the desired results. Common exploits include butter overflows, web application vulnerabilities (such as SQL injection), and configuration errors.

2. Payload

The payload is a code, where the attacker really wants the target system to execute it. For example, a reverse shell is a payload that creates a connection from the target system to the attacker as a Windows Command Prompt (CMD). While the band shell is a payload that binds the command prompt to the listening port on the target system. The attacker then can connect to the target system. A payload can also be something simple. Like some commands that will run on the target operating system.

3. Shellcode

Shellcode is a set of instructions that payload is used when exploitation occurs. Shellcode is usually written in assembly language. In some cases, shell command or meterpreter shell will be given after a series of instructions have been performed by the target machine.

4. Module

The module is a piece of software that can be used by Metasploit Framework. At some time, you may need to use an exploit module. And perhaps an additional module is required to perform some actions. Such as scanning or enumerate system. These modules are also the core of what makes the Framework powerful.

5. Listener

The listener is a component in Metasploit whose job is to wait for an incoming connection or the like. For example, once the target machine is exploited, the connection between the attacker and the target is via the internet. Listener acts to handle the connection.


Metasploit Interfaces

Metasploit offers more than one interface to the underlying function. Includes console, command line, and graphical interface. In addition to this interface, the utility provides direct access to the normal internal functionality for the Metasploit Framework. This utility can be very helpful for the development of exploitation.

1. MSFconsole

MSFconsole is the most popular part of the Metasploit Framework. Flexible, feature-rich, and supported tools in the Framework. MSFconsole provides an all-in-one practical interface for each of the options and settings available within the Framework. You can use MSFconsole to do all the commands. Includes launching exploits, loading additional modules, doing enumerate, creating the listener, or running exploits on the whole network.

Although the Metasploit Framework continues to be updated, part of the command remains relatively constant. By mastering the basics of MSFconsole, you will be able to keep up with any changes.

Starting MSFconsole

To start MSFconsole, simply input the msfconsole command on the command line:

Image: Kernel Panic (errorcybernews.com)
Image: Kernel Panic (errorcybernews.com)
To access the msfconsole help file, just enter the help followed by the command you will use. In the following example, I searched for help for the connect command. That allows us to communicate with the host.

Image: Kernel Panic (errorcybernews.com)
Image: Kernel Panic (errorcybernews.com)


2. Armitage

No less important is Armitage. A component associated with Metasploit. Armitage presents a fully interactive graphical interface created by Raphael Mudge. The interface is impressive, feature-rich, and available for free. I will not explain Armitage in depth. But Armitage deserves to be called "something to explore".

To start Armitage, simply run the Armitage command. During startup, select Start
MSF, which will allow Armitage to connect to your Metasploit instance.

Image: Kernel Panic (errorcybernews.com)
Image: Kernel Panic (errorcybernews.com)
Image: Kernel Panic (errorcybernews.com)


Metasploit Utilities

After discussing the main interface of Metasploit, it's time now to discuss utilities. The Metasploit utility is a direct interface to certain features of the Framework that can be useful in certain situations. Especially in the exploitation of development.

1. MSFvenom

Previously, to recode a payload in Metasploit, we have to redirect msfpayload via the msfencode command. But the developer Metasploit, introducing a new command is msfvenom. An order that replaces the combination of msfpayload and msfencode to streamline the process of re-encoding a Metasploit payload.


  • Metasploit PayloadThe payload component of Metasploit makes it possible to create shellcodes, executables, and more that can be used for exploits outside the Framework. Shellcode can be generated in various formats. Includes C, Ruby, JavaScript, and even Visual Basic for Applications. Each output format will be useful in various situations.
  • Metasploit EncodeThe shellcode generated from Metasploit payload is fully functional. But it still contains some null characters. Where when executed by the program, will indicate the end of the string. This will cause the process to end before it finishes. In other words, x00s and xffs can break your payload.
    And here, the shellcode will traverse the network in cleartext. Then it will be taken by intrusion detection systems (IDS) and anti-virus software. To solve this problem, Metasploit offers an encoding component. That will help to avoid bad characters, avoid anti-virus and avoid IDS with payload coding.
    Metasploit offers a number of different encoders for certain situations. Some of them will be useful when using alphanumeric characters as their cargo. As with the exploit using file formats or other applications. Where only accept printable characters as inputs.
To see the msfvenom option, just type msfvenom -h command:

Image: Kernel Panic (errorcybernews.com)
Image: Kernel Panic (errorcybernews.com)



2. Nasm Shell

The nasm_shell.rb utility can be useful when you try to understand assembly code. Especially if during development exploitation, you need to identify the opcodes (assembly instructions) for the given assembly command.

For example, here I run the tool and ask opcode for jmp esp command, then nasm_shell tells FFE4.

Image: Kernel Panic (errorcybernews.com)



Cover

In this material, I give a little knowledge of the basics of the Metasploit Framework. And now maybe you understand the basics of Metasploit. Maybe that's the first thing I can say. Other times I will continue to provide other materials that hopefully useful. If there are wrong words, misconceptions, and other errors please understand and please correction.

2 comments:

  1. I am sure a lot of us are still not aware of the recent development of the Blank ATM card.. An ATM card that can change your financial status within few days. With this Blank ATM card, you can withdraw between $2,000-$3,000 -$5, 500-$8,800-$12, 000-$20,000-$35,000 -$50,000 daily from any ATM machine in the world. There is no risk of getting caught by any form of security if you followed the instructions properly. The Blank ATM card is also sophisticated due to the fact that the card has its own security making your transaction very safe and untraceable. i am not a stupid man that i will come out to the public and start saying what someone have not done. For more info contact Mr john and also on how you are going to get your order..
    Order yours today via Email: cryptoatmhacker@gmail.com

    ReplyDelete
  2. INSTEAD OF GETTING A LOAN,, I GOT SOMETHING NEW
    Get $5,500 USD every day, for six months!

    See how it works

    Do you know you can hack into any ATM machine with a hacked ATM card??
    Make up you mind before applying, straight deal...

    Order for a blank ATM card now and get millions within a week!: contact us
    via email address::{Universalcardshackers@gmail.com}

    We have specially programmed ATM cards that can be use to hack ATM
    machines, the ATM cards can be used to withdraw at the ATM or swipe, at
    stores and POS. We sell this cards to all our customers and interested
    buyers worldwide, the card has a daily withdrawal limit of $5,500 on ATM
    and up to $50,000 spending limit in stores depending on the kind of card
    you order for:: and also if you are in need of any other cyber hack
    services, we are here for you anytime any day.

    Here is our price lists for the ATM CARDS:

    Cards that withdraw $5,500 per day costs $200 USD
    Cards that withdraw $10,000 per day costs $850 USD
    Cards that withdraw $35,000 per day costs $2,200 USD
    Cards that withdraw $50,000 per day costs $5,500 USD
    Cards that withdraw $100,000 per day costs $8,500 USD

    make up your mind before applying, straight deal!!!

    The price include shipping fees and charges, order now: contact us via
    email address:::::: {Universalcardshackers@gmail.com}
    Whatsapp:::::+31687835881

    #STAYSAFE

    ReplyDelete

Post Bottom Ad