Metasploit Commands For Beginners



The Metasploit Project is an open-source, computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool for developing and executing exploit code against a remote target machine.

Metasploit helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments.Download it from here.

For Windows

For Linux

Minimum System Requirements:


  • 2 GHz+ processor



  • 2 GB RAM available (4 GB recommended, increase accordingly with VM targets on the same device)



  • 500MB+ available disk space



  • 10/100 Mbps network interface card

    Supported Operating Systems:

  • Windows XP, 2003, Vista, 2008 Server, and Windows 7



  • Red Hat Enterprise Linux 5.x, 6.x – x86 and x86_64



  • Ubuntu linux 8.04, 10.04 – x86 and x86_64



  • Required Browser Versions

  • Mozilla Firefox 4.0+



  • Microsoft IE 9



  • Google Chrome 10+




  • Basics Terms of Metasploit

    Vulnerability: Vulnerability is a security hole in a piece of software, hardware or operating system that provides a potential angle to attack the system. Vulnerability can be as simple as weak passwords or as complex as buffer overflows or SQL injection vulnerabilities.

    Exploit:
     “Exploit” refers to a well-known bug/hole that hackers can use to gain entry into the system.To take advantage of vulnerability, you often need an exploit, a small and highly specialized computer program whose only reason of being is to take advantage of a specific vulnerability and to provide access to a computer system. 

    Payload:
     A payload is the piece of software that lets you control a computer system after it’s been exploited. The payload is typically attached to and delivered by the exploit.

    Metasploit Basic Command Tutorial


    Msfconsole 
    Help
    Help: it will show you the basic commands of Metasploit.

    Show payloads

    Show payloads: it will show you all the available payloads on Metasploit

    Show exploits

    Show exploits: it will show you all exploits in Metasploit.
    Some More Basic Commands 
    msf> use to use a exploit or payload
    msf exploit (name)> set payload nameTo add specified payload
    msf exploit (name)> set rhostTo add victim ip address to specified exploit
    msf exploit (name)>set lhostTo add attacker ip address to specified exploit
    msf exploit (name)> unset rhostTo remove rhost value
    msf exploit (name)> unset lhostTo remove lhost value
    msf exploit (name)> setg rhost To add victim ip address globally
    msf exploit (name)> setg lhostTo add localhost(attacker) ip address globally
    msf exploit (name)> sessions -l -vTo see list of sessions



    Meterpreter Basic Commands
    Help
    The ‘help’ command, as may be expected, displays the Meterpreter help menu.
    PS
    The ‘ps’ command displays a list of running processes on the target.
    LS
    As in Linux, the ‘ls’ command will list the files in the current remote directory.
    Ipconfig
    The ‘ipconfig’ command displays the network interfaces and addresses on the remote machine.
    Getuid
    Running ‘getuid’ will display the user that the Meterpreter server is running as on the host.
    Download
    The ‘download’ command downloads a file from the remote machine. Note the use of the double-slashes when giving the Windows path.
    Upload
    As with the download Command, you need to use double-slashes with the ‘upload’ command.
    Shell
    The ‘shell’ command will present you with a standard shell on the target system.

    Comments

    Popular Posts