- Metasploit Bootcamp
- Nipun Jaswal
- 457字
- 2021-07-09 21:00:02
The fundamentals of Metasploit
Now that we have completed the setup of Kali Linux, let us talk about the big picture: Metasploit. Metasploit is a security project that provides exploits and tons of reconnaissance features to aid a penetration tester. Metasploit was created by H.D. Moore back in 2003, and since then, its rapid development has led it to be recognized as one of the most popular penetration testing tools. Metasploit is entirely a Ruby-driven project and offers a great deal of exploits, payloads, encoding techniques, and loads of post-exploitation features.
Metasploit comes in various editions, as follows:
- Metasploit Pro: This edition is a commercial edition, offers tons of great features such as web application scanning and exploitation and automated exploitation, and is quite suitable for professional penetration testers and IT security teams. The Pro edition is used for advanced penetration tests and enterprise security programs.
- Metasploit Express: This is used for baseline penetration tests. Features in this version of Metasploit include smart exploitation, automated brute forcing of the credentials, and much more. This version is quite suitable for IT security teams in small to medium-sized companies.
- Metasploit Community: This is a free version with reduced functionality when compared to the Express edition. However, for students and small businesses, this edition is a favorable choice.
- Metasploit Framework: This is a command-line version with all manual tasks such as manual exploitation, third-party import, and so on. This release is entirely suitable for developers and security researchers.
You can download Metasploit from the following link:
https://www.rapid7.com/products/metasploit/download/editions/
https://www.rapid7.com/products/metasploit/download/editions/
Throughout this book, we will be using the Metasploit Community and Framework versions. Metasploit also offers various types of user interfaces, as follows:
- The graphical user interface (GUI) interface: This has all the options available at the click of a button. This interface offers a user-friendly interface that helps to provide cleaner vulnerability management.
- The console interface: This is the most preferred interface and the most popular one as well. This interface provides an all-in-one approach to all the options offered by Metasploit. This interface is also considered one of the most stable interfaces. Throughout this book, we will be using the console interface the most.
- The command-line interface: This is the more potent interface that supports the launching of exploits to activities such as payload generation. However, remembering each and every command while using the command-line interface is a difficult job.
- Armitage: Armitage by Raphael Mudge added a neat hacker-style GUI interface to Metasploit. Armitage offers easy vulnerability management, built-in NMAP scans, exploit recommendations, and the ability to automate features using the Cortana scripting language. An entire chapter is dedicated to Armitage and Cortana in the latter half of this book.
For more information on the Metasploit community, refer to https://community.rapid7.com/community/metasploit/blog.
推薦閱讀
- Kali Linux Social Engineering
- Kali Linux CTF Blueprints
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 計算機病毒分析與防范大全(第3版)
- 解密彩虹團隊非凡實戰能力:企業安全體系建設(共5冊)
- 信息安全等級保護測評與整改指導手冊
- Web安全之深度學習實戰
- Learning Pentesting for Android Devices
- 交換機·路由器·防火墻(第2版)
- 計算機系統與網絡安全研究
- 動態賦能網絡空間防御
- 2010年中國互聯網網絡安全報告
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter
- 網絡空間安全實踐能力分級培養(I)
- 一本書講透混合云安全