👾Exploitation Frameworks

Exploitation frameworks are tools used by cybersecurity professionals to test and exploit vulnerabilities found in computer systems and software. They provide a set of pre-built exploits and functionalities to gain unauthorized access, extract information, or control a system for testing purposes. These frameworks are essential for understanding and demonstrating the impact of vulnerabilities in a controlled environment.

  • The Metasploit Framework (MSF) is an open-source, robust penetration testing and exploitation framework that is used by penetration testers and security researchers worldwide.

  • It provides penetration testers with a robust infrastructure required to automate every stage of the penetration testing life cycle.

  • It is also used to develop and test exploits and has one of the world’s largest database of public, tested exploits.

  • The Metasploit Framework is designed to be modular, allowing for new functionality to be implemented with ease.

Essential Terminology

  • Interface – Methods of interacting with the Metasploit Framework

  • Module – Pieces of code that perform a particular task, an example of a module is an exploit.

  • Vulnerability – Weakness or flaw in a computer system or network that can be exploited.

  • Exploit – Piece of code/module that is used to take advantage a vulnerability within a system, service or application.

  • Payload – Piece of code delivered to the target system by an exploit with the objective of executing arbitrary commands or providing remote access to an attacker.

  • Listener – A utility that listens for an incoming connection from a target.

Metasploit Framework Console

  • The Metasploit Framework Console (MSFconsole) is an easy-to-use all in one interface that provides you with access to all the functionality of the Metasploit Framework.

Penetration Testing With MSF

  • The MSF can be used to perform and automate various tasks that fall under the penetration testing life cycle.

  • In order to understand how we can leverage the MSF for penetration testing, we need to explore the various phases of a penetration test and their respective techniques and objectives.

  • We can adopt the PTES (Penetration Testing Execution Standard) as a roadmap to understanding the various phases that make up a penetration test and how Metasploit can be integrated in to each phase.

💣The Metasploit Framework (MSF)

  • PowerShell-Empire (Aka Empire) is a pure PowerShell exploitation/post-exploitation framework built on cryptological-secure communications and flexible architecture.

  • Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from keyloggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework.

  • PowerShell Empire recently received an update and is now officially support and maintained by Kali Linux, more information regarding the update can be found here:

Starkiller

  • In addition to being updated and modernized, BC Security, the company responsible for maintaining the Empire has also developed a companion to Empire called Starkiller.

  • Starkiller is a GUI Frontend for the Powershell Empire. It is an Electron application written in VueJS and provides users with an intuitive way of interacting with Empire.

  • PowerShell-Empire & Starkiller are both available as packages in the Kali Linux repositories.

PowerShell-Empire Installation

Installation Steps:

  1. Update Package List:

    sudo apt-get update
  2. Install Powershell-Empire and Starkiller:

    sudo apt-get install powershell-empire starkiller -y

Post-Installation Steps:

  1. Start Powershell-Empire Server:

    sudo powershell-empire server
  2. Access CLI Mode:

    sudo powershell-empire client
  3. Access Starkiller GUI:

    • Open the Kali menu and select "starkiller".

    • Use the following credentials to log in:

      • Username: empireadmin

      • Password: password123




Hacker's Mantra: Humiliation is the favorite currency of the hacker. - Sherlock Holmes

Last updated