Quantcast
Channel: Pax Pentest » Metasploit
Browsing all 52 articles
Browse latest View live

Solving Metasploit msfupdate problem in Backtrack 5 with localhost:3790

If, like me, you are reading books on Penetration Testing, it is highly likely that some of the information is out of date. In The Basics of Hacking and Penetration Testing the author arrives at an...

View Article


Learning Metasploit and configuring my virtual hacking Lab

OK, it’s time for me to begin my discovery of Metasploit. This is a framework tool for developing and executing exploit code against remote target machines. I’ve read Metasploit should be used like a...

View Article


Information Gathering: Nmap Network Port Scanning

Both The Basics of Hacking and Penetration Testing and Metasploit: The Penetration Tester’s Guide introduce us early on to the port scanner Nmap. Nmap Network Scanning describe the tool thus: Nmap...

View Article

Metasploit Server Message Block Scanner: smb_version module

Metasploit has an inbuilt ‘targeted’ scanner designed specifically to attempt to identify Microsoft Windows versions on networks, called smb_version module. SMB stands for Server Message Block and Wiki...

View Article

Metasploit Microsoft SQL Server Scanner: mssql_ping

Metasploit has an inbuilt module – mssql_ping – designed specifically to scan for Microsoft SQL servers on a network. So, let’s see how it performs against my Virtual Hacking Lab. msf > use...

View Article


Metasploit FTP Scanner: ftp_version Module

Metasploit has an inbuilt module – ftp_version – designed specifically to scan for File Transfer Protocol services (FTP) on a network. Let’s see how it performs against my Virtual Hacking Lab: msf >...

View Article

Metasploit: Simple Network Management protocol (SNMP) snmp_enum Auxiliary Module

Metasploit has an in-built auxiliary module designed to sweep for Simple Network Management Protocol: snmp_enum. Let’s see how it performs against my virtual hacking lab: msf auxiliary(snmp_login) >...

View Article

Metasploit Basic Vulnerability Scan: Netcat Banner Grabbing

It is possible to write a custom scanner using Metasploit Framework ‘mixins’ and Ruby programming, but that’s too advanced for me and so I will conduct a simple vulnerability scan on my Virtual Hacking...

View Article


Where I’m at

OK, I’m a couple of months into this cyber-security hobby and the one thing I’ve learned most keenly, is how much there is to learn. The learning curve is steep and vast and a little overwhelming at...

View Article


Metasploit SMB Login Check Scanner

Just tried out the Metasploit username and password checker: SMB Login Check Scanner against my Virtual Hacking Lab. I confess that I’m unsure as to the practical applications of this feature, as the...

View Article

My First Metasploit Exploit

I shall attempt my first exploit and target the Windows portion of my Virtual Hacking Lab. I’m following instructions given in Chapter 5 (The Joy of Exploitation) of Metasploit: The Penetration...

View Article

Metasploit The Penetration Tester’s Guide – Ubuntu 9.04 Heap-Based Samba Exploit

Just a quick post to identify a frustrating problem in Metasploit: The Penetration Tester’s Guide. Chapter five – The Joy of Exploitation – “Exploiting an Ubuntu Machine” simply doesn’t work. The book...

View Article

Metasploit All-Ports Payloads: Brute Forcing Ports

I’m targeting ports on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 5 (The Joy of Exploitation) of Metasploit: The Penetration Tester’s Guide. The exploitee...

View Article


Metasploit: Exploiting MS SQL Server: Fast-Track, mssql_ping, mssql_login,...

I’m targeting the MS MSQL Server on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 6 (Meterpreter) of Metasploit: The Penetration Tester’s Guide. The...

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter Shell: Screenshot, sysinfo, ps, migrate, keylog_recorder

This post follows on from a previous post in which the target machine was exploited and a Meterpreter shell obtained. First to export an image of the target machine’s desktop: meterpreter >...

View Article


Metasploit: Pass the Hash – windows/smb/psexec

Probably my favourite blog title so far. Following on from the Hashdump post in which I obtained the Windows passwords in the form of hashes and then decrypted them for the password, the following uses...

View Article

Metasploit Meterpreter: Using ps and stealing Kerberos tokens

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article


Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Run VNC

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Sniffing traffic on exploited system – Packetrecorder

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Metasploit Meterpreter: Creating a persistent backdoor connection

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article
Browsing all 52 articles
Browse latest View live