๐ฃThe Metasploit Framework (MSF)
For this particular session, I did not create any detailed notes. Instead, I have listed the modules used in this session along with a one-line description of their usage. This is not a complete set of notes for this section only. As I am very familiar with The Metasploit Framework (MSF), for more details you can refer to the following documentation for The Metasploit Framework (MSF) by Rapid7.
Nmap Commands
Create a new workspace with the specified name:
Import the results of an Nmap scan into the Metasploit database:
List the hosts stored in the Metasploit database:
List the services associated with hosts in the Metasploit database:
Perform an Nmap scan against a specific IP address, and update the Metasploit database with the scan results:
List the vulnerabilities identified and stored in the Metasploit database:
Enumeration
Port Scanning with Auxiliary Modules
Search for modules related to port scanning within the Metasploit framework:
Use
curl
to make an HTTP request to the specified IP address:Run the
autoroute
module to add routes for the specified IP range, allowing traffic to be routed through the compromised host:
FTP Enumeration
Search for auxiliary modules related to FTP in the Metasploit framework:
Auxiliary Modules:
Determine the FTP server version running on a target host:
Perform login attempts against an FTP server to validate credentials:
Check if anonymous FTP login is allowed on the target FTP server:
Enumerate directories and files on an FTP server:
Retrieve a list of directories and files from an FTP server:
SMB Enumeration
Search for auxiliary modules related to SMB (Server Message Block) services in the Metasploit framework:
Auxiliary Modules:
Enumerate available shares on an SMB server:
Enumerate user accounts on an SMB server:
Determine the SMB version and OS information of an SMB server:
Perform login attempts against an SMB server to validate credentials:
Enumerate group names on an SMB server:
Web Server Enumeration
Search for auxiliary modules related to HTTP services in the Metasploit framework:
Auxiliary Modules:
Enumerate Apache user directories:
Perform directory brute force attacks:
Scan for directories on a web server:
Check for directory listings on a web server:
Test for the HTTP PUT method:
Check for files in web directories:
Perform HTTP login attempts:
Retrieve HTTP headers from web servers:
Determine the version of HTTP used by web servers:
Retrieve and analyze the
robots.txt
file from web servers:
MySQL Enumeration:
Search for auxiliary modules related to MySQL services in the Metasploit framework.
Auxiliary Modules:
Enumerate MySQL databases and tables.
Execute arbitrary SQL commands against a MySQL server.
Enumerate files on a MySQL server.
Dump password hashes from a MySQL server.
Perform login attempts against a MySQL server.
Dump database schemas from a MySQL server.
Determine the version of MySQL running on a server.
Identify writable directories on a MySQL server.
SSH Enumeration:
Search for auxiliary modules related to SSH (Secure Shell) services in the Metasploit framework.
Auxiliary Modules:
Determine the version of the SSH protocol used by an SSH server.
Perform login attempts against an SSH server.
SMTP Enumeration:
Search for auxiliary modules related to SMTP (Simple Mail Transfer Protocol) services in the Metasploit framework.
Auxiliary Modules:
Enumerate SMTP accounts on a mail server.
Check if the SMTP server allows relaying.
Enumerate valid usernames on an SMTP server.
Verify the validity of email addresses using SMTP VRFY commands.
Enumerate webmail accounts associated with an SMTP server.
Vulnerability Scanning
Vulnerability Scanning With MSF:
The
analyze
command is used for analyzing modules, exploits, and vulnerabilities in the Metasploit framework.Metasploit-Autopwn GitHub Script: Metasploit-Autopwn is a GitHub script that automates the process of scanning and exploiting vulnerabilities using Metasploit. It simplifies the task of identifying and exploiting targets.
To load a custom module in Metasploit:
Move the custom module file to the Metasploit plugins directory.
Load the
db_autopwn
module, which is used for automating the exploitation of targets in the Metasploit database.
Vulnerability Scanning With Nessus:
Import a Nessus scan report file into the Metasploit database with the "c" option to clear existing data.
Web App Vulnerability Scanning With WMAP:
Load the WMAP (Web Metasploit Automation Project) extension.
Access the WMAP sub-menu for further commands.
Add a target URL to the WMAP scan list.
List the target sites currently in the WMAP scan list.
Specify a target URL for scanning.
List the defined target URLs.
Run WMAP scans on the specified target.
Export WMAP scan results.
List the discovered vulnerabilities from WMAP scans.
Exploitation
Windows Exploitation
Exploiting A Vulnerable HTTP File Server:
This Metasploit module exploits a remote code execution vulnerability in Rejetto HTTP File Server (HFS). It allows an attacker to execute arbitrary code on a target system running a vulnerable version of HFS.
Exploiting Windows MS17-010 SMB Vulnerability:
This Metasploit module exploits the MS17-010 vulnerability, also known as EternalBlue, in the SMB (Server Message Block) protocol. It allows an attacker to execute arbitrary code on a target system running a vulnerable version of Windows.
Exploiting WinRM (Windows Remote Management Protocol):
This auxiliary module is used to perform login attempts against a Windows Remote Management (WinRM) service to check for valid credentials.
This auxiliary module enumerates the authentication methods supported by a WinRM service.
This auxiliary module allows the execution of arbitrary commands on a remote Windows system through the WinRM service.
This Metasploit module is used to execute PowerShell scripts on a remote Windows system via the WinRM service.
Exploiting A Vulnerable Apache Tomcat Web Server:
This Metasploit module exploits a vulnerability in Apache Tomcat servers that allows an attacker to bypass file upload restrictions and upload a JSP (JavaServer Pages) webshell, which can lead to remote code execution on the target server.
Linux Exploitation
Exploiting A Vulnerable FTP Server:
This Metasploit module exploits a backdoor vulnerability in certain versions of the vsftpd FTP (File Transfer Protocol) server. It allows an attacker to gain unauthorized access to the target system.
Exploiting Samba:
This Metasploit module checks if a named pipe exists on a Linux system running Samba. Named pipes can be used for remote code execution and lateral movement in some scenarios.
Exploiting A Vulnerable SSH Server:
This auxiliary module is used to scan for SSH servers that are vulnerable to the LibSSH authentication bypass vulnerability. This vulnerability allows an attacker to gain unauthorized access to SSH servers without proper authentication.
Exploiting A Vulnerable SMTP Server:
This Metasploit module exploits vulnerabilities in the Haraka SMTP server on Linux systems. It allows an attacker to gain unauthorized access and execute arbitrary code on the target system.
Hacker's Mantra:
Being a hacker does not say what side you are on. Being a hacker means you know how things actually work and can manipulate the way things actually work for good or for harm. - Dan K
Last updated
Was this helpful?