官术网_书友最值得收藏!

  • Mastering Metasploit
  • Nipun Jaswal
  • 271字
  • 2021-06-30 14:50:40

Conducting a penetration test with Metasploit

Now that we've set up Metasploit 5, we are ready to perform our first penetration test. However, before we start the test, let's recall some of the essential functions and terminologies used in Metasploit Framework.

Recalling the basics of Metasploit

After we run Metasploit, we can list all the useful commands available by typing help or ? in the Metasploit console. Let's recall the basic terms used in Metasploit, which are as follows:

  • Exploits: This is a piece of code that, when executed, will exploit the vulnerability of the target.
  • Payload: This is a piece of code that runs on the target after successful exploitation. It defines the actions we want to perform on the target system.
  • Auxiliary: These are modules that provide additional functionalities such as scanning, fuzzing, sniffing, and much more.
  • Encoders: Encoders are used to obfuscate modules to avoid detection by a protection mechanism such as an antivirus or a firewall.
  • Meterpreter: Meterpreter is a payload that uses in-memory DLL injection stagers. It provides a variety of functions we can perform on the target, which makes it a popular choice.

Now, let's recall some of the basic commands of Metasploit that we will use in this chapter. Let's see what they are supposed to do:

Let's have a look at the basic Meterpreter commands as well:

Since we have now recalled the basic Metasploit commands, let's have a look at the benefits of using Metasploit over traditional tools and scripts.

Important Note

If you are using Metasploit for the very first time, refer to https://github.com/rapid7/metasploit-framework/wiki for more information on the basic commands.

主站蜘蛛池模板: 琼海市| 苍南县| 商丘市| 东城区| 诏安县| 泰和县| 新源县| 伊宁县| 乐陵市| 方正县| 沧源| 黄大仙区| 新龙县| 桂阳县| 清徐县| 禹州市| 库车县| 瑞昌市| 玛沁县| 铅山县| 石嘴山市| 谷城县| 河曲县| 黎川县| 安福县| 溧水县| 通山县| 南涧| 西乡县| 峨边| 泰兴市| 金沙县| 息烽县| 阳山县| 聂荣县| 沿河| 巫山县| 始兴县| 黎川县| 军事| 古浪县|