# Exploitation Frameworks

> Exploitation frameworks are tools used by cybersecurity professionals to test and exploit vulnerabilities found in computer systems and software. They provide a set of pre-built exploits and functionalities to gain unauthorized access, extract information, or control a system for testing purposes. These frameworks are essential for understanding and demonstrating the impact of vulnerabilities in a controlled environment.

## [The Metasploit Framework (MSF)](https://docs.rapid7.com/metasploit/msf-overview/)

* The Metasploit Framework (MSF) is an open-source, robust penetration testing and exploitation framework that is used by penetration testers and security researchers worldwide.
* It provides penetration testers with a robust infrastructure required to automate every stage of the penetration testing life cycle.
* It is also used to develop and test exploits and has one of the world’s largest database of public, tested exploits.
* The Metasploit Framework is designed to be modular, allowing for new functionality to be implemented with ease.

### Essential Terminology

* **Interface** – Methods of interacting with the Metasploit Framework
* **Module** – Pieces of code that perform a particular task, an example of a module is an exploit.
* **Vulnerability** – Weakness or flaw in a computer system or network that can be exploited.
* **Exploit** – Piece of code/module that is used to take advantage a vulnerability within a system, service or application.
* **Payload** – Piece of code delivered to the target system by an exploit with the objective of executing arbitrary commands or providing remote access to an attacker.
* **Listener** – A utility that listens for an incoming connection from a target.

### **Metasploit Framework Console**

* The Metasploit Framework Console (MSFconsole) is an easy-to-use all in one interface that provides you with access to all the functionality of the Metasploit Framework.

### **Penetration Testing With MSF**

* The MSF can be used to perform and automate various tasks that fall under the penetration testing life cycle.
* In order to understand how we can leverage the MSF for penetration testing, we need to explore the various phases of a penetration test and their respective techniques and objectives.
* We can adopt the PTES (Penetration Testing Execution Standard) as a roadmap to understanding the various phases that make up a penetration test and how Metasploit can be integrated in to each phase.

<figure><img src="https://3226903849-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FaKwXOzYgG7jDDDoVkYvX%2Fuploads%2FVoLE1JHgrNvsMO2LQt55%2FThe%20Metasploit%20Framework%20(MSF).png?alt=media&#x26;token=113e29a3-b3b3-4072-ace0-e2854673c455" alt=""><figcaption><p>The Metasploit Framework (MSF)</p></figcaption></figure>

{% content-ref url="../the-metasploit-framework-msf" %}
[the-metasploit-framework-msf](https://blog.rootkid.in/exam-prep-notes/junior-penetration-tester-ejptv2-notes/host-and-network-penetration-testing/the-metasploit-framework-msf)
{% endcontent-ref %}

***

## [PowerShell-Empire](https://www.kali.org/tools/powershell-empire/)

* PowerShell-Empire (Aka Empire) is a pure PowerShell exploitation/post-exploitation framework built on cryptological-secure communications and flexible architecture.
* Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from keyloggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework.
* PowerShell Empire recently received an update and is now officially support and maintained by Kali Linux, more information regarding the update can be found here:
  * <https://www.kali.org/blog/empire-starkiller/>

### Starkiller

* In addition to being updated and modernized, BC Security, the company responsible for maintaining the Empire has also developed a companion to Empire called Starkiller.
* Starkiller is a GUI Frontend for the Powershell Empire. It is an Electron application written in VueJS and provides users with an intuitive way of interacting with Empire.
* PowerShell-Empire & Starkiller are both available as packages in the Kali Linux repositories.

### PowerShell-Empire **Installation**

#### **Installation Steps:**

1. **Update Package List:**

   ```bash
   sudo apt-get update
   ```
2. **Install Powershell-Empire and Starkiller:**

   ```bash
   sudo apt-get install powershell-empire starkiller -y
   ```

#### **Post-Installation Steps:**

1. **Start Powershell-Empire Server:**

   ```bash
   sudo powershell-empire server
   ```
2. **Access CLI Mode:**

   ```bash
   sudo powershell-empire client
   ```
3. **Access Starkiller GUI:**
   * Open the Kali menu and select "starkiller".
   * Use the following credentials to log in:
     * **Username:** empireadmin
     * **Password:** password123

***

***

***

**`Hacker's Mantra:`**` ``Humiliation is the favorite currency of the hacker. - Sherlock Holmes`
