当前位置:网站首页>Basic use of Metasploit penetration testing framework
Basic use of Metasploit penetration testing framework
2022-07-03 04:48:00 【m0_ forty-eight million two hundred and ninety-four thousand tw】
1.Metasploit System framework
1、 Base library : metasploit The basic library file is located in the root directory of the source code libraries Directory , Include Rex,framework-core and framework-base In the third part of .
Rex It is the most basic components that the whole framework depends on , Such as wrapped network socket 、 Implementation of network application protocol client and server 、 Log subsystem 、 Penetration attack support routines 、PostgreSQL as well as MySQL Database support, etc ;
framework-core The library is responsible for realizing all the interactive interfaces with various types of upper modules and plug-ins ;
framework-base The library has expanded framework-core, Provide simpler packaging routines , It also provides some function classes for dealing with the functions of all aspects of the framework , It is used to support the user interface and function program to call the function of the framework itself and the framework integration module ;
2、 modular : Module organization is divided into... According to different purposes 6 Types of modules (Modules):
Divided into auxiliary modules (Aux)、 Penetration attack module (Exploits)、 Post penetration attack module (Post)、 Attack load module (payloads)、 Encoder module (Encoders)、 Empty instruction module (Nops).
notes : payload Also known as attack payload , It is mainly used to establish a stable connection between the target machine and the attacker , You can go back to shell, Program injection can also be carried out .
3、 plug-in unit : Plug-ins can extend the functions of the framework , Or assemble components with existing functions to form advanced features . The plug-in can integrate some existing external security tools , Such as Nessus、OpenVAS Vulnerability scanner, etc , Provide some new functions for the user interface .
4、 Interface : Include msfconsole Control terminal 、msfcli Command line 、msfgui Graphical interface 、armitage Graphical interface and msfapi Remote call interface .
5、 Function program : metasploit It also provides a series of functional programs that can be run directly , Support penetration testers and security personnel to quickly use metasploit The ability within the framework to accomplish some specific tasks . such as msfpayload、msfencode and
msfvenom The attack payload can be encapsulated as an executable 、C Language 、JavaScript Language and other forms , And can carry out various types of coding .
The software directory is located in :
data: Metasploit Editable files used
documentation: Provide documentation for the framework
lib: Framework code base
modules: Actually MSF modular
plugins: Plugins that can be loaded at run time
scripts: Meterpreter And other scripts
tools: Various useful command line tools
Open the module and you can see the following , If you are interested, you can check the contents of each folder :
2. Drone aircraft
Target link :
After using the virtual machine to open , Set the network to bridge mode , Login account password
For the convenience of modifying the configuration file , Modify... After login root Account password :
sudo passwd root
Switch to root Account
su root
Target's IP No settings , Because the network is a bridge mode , You can use it directly , It will automatically get used ifconfig see :
2.Metasploit Use
Metasploit The program needs to use Postgresql database .
First, in the kali Open the database and set the database to start automatically
systemctl start postgresql
systemctl enable postgresql
Then initialize the database :
msfdb init
Turn on Metasploit, You can directly use the program to open , You can also use the command line msfconsole open :
Check it out help
Core Commands # Core command
Module Commands# Module command
Job Commands# Background task command
Resource Script Commands# Resource script command
Database Backend Commands# Database backend command
Credentials Backend Commands# certificate / Voucher backend command
Developer Commands# Developer commands
边栏推荐
- 【SQL注入点】注入点出现位置、判断
- [SQL injection point] location and judgment of the injection point
- Reptile exercise 02
- Youdao cloud notes
- Pyqt control part (II)
- GFS distributed file system (it's nice to meet it alone)
- 关于开学的准备与专业认知
- The usage of micro service project swagger aggregation document shows all micro service addresses in the form of swagger grouping
- 消息队列(MQ)介绍
- C language self-made Games: Sanzi (tic tac toe chess) intelligent chess supplement
猜你喜欢
The simple problem of leetcode: dismantling bombs
有道云笔记
FISCO bcos zero knowledge proof Fiat Shamir instance source code
The reason why the entity class in the database is changed into hump naming
Truncated sentences of leetcode simple questions
并发操作-内存交互操作
Leetcode simple question: check whether the string is an array prefix
After job hopping at the end of the year, I interviewed more than 30 companies in two weeks and finally landed
Pyqt control part (II)
关于开学的准备与专业认知
随机推荐
Thesis reading_ Chinese NLP_ ELECTRA
The programmer went to bed at 12 o'clock in the middle of the night, and the leader angrily scolded: go to bed so early, you are very good at keeping fit
FuncS sh file not found when using the benchmarksql tool to test kingbases
I've seen a piece of code in the past. I don't know what I'm doing. I can review it when I have time
AWS VPC
Number of 1 in binary (simple difficulty)
[set theory] binary relationship (special relationship type | empty relationship | identity relationship | global relationship | divisive relationship | size relationship)
Thesis reading_ ICD code_ MSMN
After reviewing MySQL for a month, I was stunned when the interviewer of Alibaba asked me
General undergraduate college life pit avoidance Guide
String matching: find a substring in a string
[set theory] binary relation (example of binary relation on a | binary relation on a)
2022 a special equipment related management (elevator) analysis and a special equipment related management (elevator) simulation test
Youdao cloud notes
stm32逆向入门
The current market situation and development prospect of the global gluten tolerance test kit industry in 2022
LVS load balancing cluster of efficient multi-purpose cluster (NAT mode)
Ffmpeg mix
[PHP vulnerability weak type] basic knowledge, PHP weak equality, error reporting and bypassing
论文阅读_中文医疗模型_ eHealth