当前位置:网站首页>Basic use of Metasploit penetration testing framework
Basic use of Metasploit penetration testing framework
2022-07-03 04:48:00 【m0_ forty-eight million two hundred and ninety-four thousand tw】
1.Metasploit System framework

1、 Base library : metasploit The basic library file is located in the root directory of the source code libraries Directory , Include Rex,framework-core and framework-base In the third part of .
Rex It is the most basic components that the whole framework depends on , Such as wrapped network socket 、 Implementation of network application protocol client and server 、 Log subsystem 、 Penetration attack support routines 、PostgreSQL as well as MySQL Database support, etc ;
framework-core The library is responsible for realizing all the interactive interfaces with various types of upper modules and plug-ins ;
framework-base The library has expanded framework-core, Provide simpler packaging routines , It also provides some function classes for dealing with the functions of all aspects of the framework , It is used to support the user interface and function program to call the function of the framework itself and the framework integration module ;
2、 modular : Module organization is divided into... According to different purposes 6 Types of modules (Modules):
Divided into auxiliary modules (Aux)、 Penetration attack module (Exploits)、 Post penetration attack module (Post)、 Attack load module (payloads)、 Encoder module (Encoders)、 Empty instruction module (Nops).
notes : payload Also known as attack payload , It is mainly used to establish a stable connection between the target machine and the attacker , You can go back to shell, Program injection can also be carried out .
3、 plug-in unit : Plug-ins can extend the functions of the framework , Or assemble components with existing functions to form advanced features . The plug-in can integrate some existing external security tools , Such as Nessus、OpenVAS Vulnerability scanner, etc , Provide some new functions for the user interface .
4、 Interface : Include msfconsole Control terminal 、msfcli Command line 、msfgui Graphical interface 、armitage Graphical interface and msfapi Remote call interface .
5、 Function program : metasploit It also provides a series of functional programs that can be run directly , Support penetration testers and security personnel to quickly use metasploit The ability within the framework to accomplish some specific tasks . such as msfpayload、msfencode and
msfvenom The attack payload can be encapsulated as an executable 、C Language 、JavaScript Language and other forms , And can carry out various types of coding .
The software directory is located in :
data: Metasploit Editable files used
documentation: Provide documentation for the framework
lib: Framework code base
modules: Actually MSF modular
plugins: Plugins that can be loaded at run time
scripts: Meterpreter And other scripts
tools: Various useful command line tools
Open the module and you can see the following , If you are interested, you can check the contents of each folder :
2. Drone aircraft
Target link :
After using the virtual machine to open , Set the network to bridge mode , Login account password

For the convenience of modifying the configuration file , Modify... After login root Account password :
sudo passwd rootSwitch to root Account
su root
Target's IP No settings , Because the network is a bridge mode , You can use it directly , It will automatically get used ifconfig see :

2.Metasploit Use
Metasploit The program needs to use Postgresql database .
First, in the kali Open the database and set the database to start automatically
systemctl start postgresql
systemctl enable postgresql
Then initialize the database :
msfdb init
Turn on Metasploit, You can directly use the program to open , You can also use the command line msfconsole open :


Check it out help

Core Commands # Core command
Module Commands# Module command
Job Commands# Background task command
Resource Script Commands# Resource script command
Database Backend Commands# Database backend command
Credentials Backend Commands# certificate / Voucher backend command
Developer Commands# Developer commands
边栏推荐
- Market status and development prospect prediction of global fermentation acid industry in 2022
- MC Layer Target
- 2022 P cylinder filling test content and P cylinder filling simulation test questions
- Literature reading_ Research on the usefulness identification of tourism online comments based on semantic fusion of multimodal data (Chinese Literature)
- Use Sqlalchemy module to obtain the table name and field name of the existing table in the database
- Market status and development prospect prediction of the near infrared sensor industry of the global Internet of things in 2022
- [set theory] binary relation (example of binary relation on a | binary relation on a)
- Priv app permission exception
- 2.14 summary
- Why should programmers learn microservice architecture if they want to enter a large factory?
猜你喜欢

MPM model and ab pressure test

Learning practice: comprehensive application of cycle and branch structure (I)

Introduction to JVM principle

Auman Galaxy new year of the tiger appreciation meeting was held in Beijing - won the double certification of "intelligent safety" and "efficient performance" of China Automotive Research Institute

2022 new examination questions for the main principals of hazardous chemical business units and examination skills for the main principals of hazardous chemical business units

How to choose cross-border e-commerce multi merchant system

Preparation for school and professional cognition

data2vec! New milestone of unified mode

Why should programmers learn microservice architecture if they want to enter a large factory?

论文阅读_中文医疗模型_ eHealth
随机推荐
JVM原理简介
I've seen a piece of code in the past. I don't know what I'm doing. I can review it when I have time
Market status and development prospect prediction of global fermentation acid industry in 2022
Auman Galaxy new year of the tiger appreciation meeting was held in Beijing - won the double certification of "intelligent safety" and "efficient performance" of China Automotive Research Institute
Learning practice: comprehensive application of cycle and branch structure (I)
[set theory] binary relationship (special relationship type | empty relationship | identity relationship | global relationship | divisive relationship | size relationship)
Summary of training competition (Lao Li's collection of questions)
2022 a special equipment related management (elevator) analysis and a special equipment related management (elevator) simulation test
Small sample target detection network with attention RPN and multi relationship detector (provide source code, data and download)
SSM based campus part-time platform for College Students
RSRS index timing and large and small disc rotation
[USACO 2009 Dec S]Music Notes
雇佣收银员(差分约束)
带有注意力RPN和多关系检测器的小样本目标检测网络(提供源码和数据及下载)...
FISCO bcos zero knowledge proof Fiat Shamir instance source code
论文阅读_ICD编码_MSMN
Arthas watch grabs a field / attribute of the input parameter
MPM model and ab pressure test
Triangular rasterization
Thesis reading_ ICD code_ MSMN