Solving Metasploit msfupdate problem in Backtrack 5 with localhost:3790
If, like me, you are reading books on Penetration Testing, it is highly likely that some of the information is out of date. In The Basics of Hacking and Penetration Testing the author arrives at an...
View ArticleLearning Metasploit and configuring my virtual hacking Lab
OK, it’s time for me to begin my discovery of Metasploit. This is a framework tool for developing and executing exploit code against remote target machines. I’ve read Metasploit should be used like a...
View ArticleInformation Gathering: Nmap Network Port Scanning
Both The Basics of Hacking and Penetration Testing and Metasploit: The Penetration Tester’s Guide introduce us early on to the port scanner Nmap. Nmap Network Scanning describe the tool thus: Nmap...
View ArticleMetasploit Server Message Block Scanner: smb_version module
Metasploit has an inbuilt ‘targeted’ scanner designed specifically to attempt to identify Microsoft Windows versions on networks, called smb_version module. SMB stands for Server Message Block and Wiki...
View ArticleMetasploit Microsoft SQL Server Scanner: mssql_ping
Metasploit has an inbuilt module – mssql_ping – designed specifically to scan for Microsoft SQL servers on a network. So, let’s see how it performs against my Virtual Hacking Lab. msf > use...
View ArticleMetasploit FTP Scanner: ftp_version Module
Metasploit has an inbuilt module – ftp_version – designed specifically to scan for File Transfer Protocol services (FTP) on a network. Let’s see how it performs against my Virtual Hacking Lab: msf >...
View ArticleMetasploit: Simple Network Management protocol (SNMP) snmp_enum Auxiliary Module
Metasploit has an in-built auxiliary module designed to sweep for Simple Network Management Protocol: snmp_enum. Let’s see how it performs against my virtual hacking lab: msf auxiliary(snmp_login) >...
View ArticleMetasploit Basic Vulnerability Scan: Netcat Banner Grabbing
It is possible to write a custom scanner using Metasploit Framework ‘mixins’ and Ruby programming, but that’s too advanced for me and so I will conduct a simple vulnerability scan on my Virtual Hacking...
View ArticleWhere I’m at
OK, I’m a couple of months into this cyber-security hobby and the one thing I’ve learned most keenly, is how much there is to learn. The learning curve is steep and vast and a little overwhelming at...
View ArticleMetasploit SMB Login Check Scanner
Just tried out the Metasploit username and password checker: SMB Login Check Scanner against my Virtual Hacking Lab. I confess that I’m unsure as to the practical applications of this feature, as the...
View ArticleMy First Metasploit Exploit
I shall attempt my first exploit and target the Windows portion of my Virtual Hacking Lab. I’m following instructions given in Chapter 5 (The Joy of Exploitation) of Metasploit: The Penetration...
View ArticleMetasploit The Penetration Tester’s Guide – Ubuntu 9.04 Heap-Based Samba Exploit
Just a quick post to identify a frustrating problem in Metasploit: The Penetration Tester’s Guide. Chapter five – The Joy of Exploitation – “Exploiting an Ubuntu Machine” simply doesn’t work. The book...
View ArticleMetasploit All-Ports Payloads: Brute Forcing Ports
I’m targeting ports on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 5 (The Joy of Exploitation) of Metasploit: The Penetration Tester’s Guide. The exploitee...
View ArticleMetasploit: Exploiting MS SQL Server: Fast-Track, mssql_ping, mssql_login,...
I’m targeting the MS MSQL Server on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 6 (Meterpreter) of Metasploit: The Penetration Tester’s Guide. The...
View ArticleMetasploit Meterpreter Shell: Screenshot, sysinfo, ps, migrate, keylog_recorder
This post follows on from a previous post in which the target machine was exploited and a Meterpreter shell obtained. First to export an image of the target machine’s desktop: meterpreter >...
View ArticleMetasploit: Pass the Hash – windows/smb/psexec
Probably my favourite blog title so far. Following on from the Hashdump post in which I obtained the Windows passwords in the form of hashes and then decrypted them for the password, the following uses...
View ArticleMetasploit Meterpreter: Using ps and stealing Kerberos tokens
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Run VNC
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Sniffing traffic on exploited system – Packetrecorder
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Creating a persistent backdoor connection
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View Article