- Metasploit Penetration Testing Cookbook
- Abhinav Singh
- 306字
- 2021-08-13 18:21:09
Metasploit with BackTrack 5 the ultimate combination
BackTrack is the most popular operating system for security professionals for two reasons. Firstly, it has all the popular penetration testing tools pre-installed in it so it reduces the cost of a separate installation. Secondly, it is a Linux-based operating system which makes it less prone to virus attacks and provides more stability during penetration testing. It saves your time from installing relevant components and tools and who knows when you may encounter an unknown error during the installation process.
Getting ready
Either you can have a separate installation of BackTrack on your hard disk or you can also use it over a host on a virtual machine. The installation process is simple and the same as installing any Linux-based operating system.
How to do it...
- On booting the BackTrack OS, you will be asked to enter the username and password. The default username for the root user is
root
and the password istoor
. - On successful login, you can either work over the command line or enter
startx
to enter in the GUI mode. - You can either start the Metasploit framework from the Applications menu or from the command line. To launch Metasploit from the Applications menu go to Applications | BackTrack | Exploitation Tools | Network Exploitation Tools | Metasploit Framework, as shown in the following screenshot:
- Metasploit follows a simple directory structure hierarchy where the root folder is
pentest
. The directory further branches to/exploits/framework3
. To launch Metasploit from the command line, launch the terminal and enter the following command to move to the Metasploit directory:root@bt:~# cd /pentest/exploits/framework3 root@bt:/pentest/exploits/framework3 ~# ./msfconsole
How it works...
Launching Metasploit from the command line will follow the complete path to msfconsole
. Launching it from the Application menu will provide us a direct access to different UIs available to us.
- Aptana Studio Beginner's Guide
- 光網絡評估及案例分析
- OpenLayers Cookbook
- 互聯網安全的40個智慧洞見:2014年中國互聯網安全大會文集
- Socket.IO Real-time Web Application Development
- 搶占下一個智能風口:移動物聯網
- AWS Lambda Quick Start Guide
- 計算機網絡技術
- Enterprise ApplicationDevelopment with Ext JSand Spring
- NB-IoT原理和優化
- Microservices Development Cookbook
- 物聯網傳感器技術與應用
- 網絡分析技術揭秘:原理、實踐與WinPcap深入解析
- 互聯網心理學:新心理與行為研究的興起
- Telerik WPF Controls Tutorial