Tag: metasploit

Fuzzing, Metasploit

Fuzzing with Metasploit

Fuzzing or fuzz testing is an automated or semi-automated black box software testing technique that automates the process of data generation and injection to discover bugs, crashes, maximum overflow capacities and memory leaks in software applications, protocols, file formats and computer systems by providing invalid, unexpected and random data to the inputs of the system. …

Exploitation, Metasploit

Exploitation and Metasploit

If a vulnerable host has been discovered and identified it is time for the real deal. The Metasploit Framework contains hundreds of exploits. Running show exploitsshow exploits from msfconsole will display every exploit available in the Framework. Other valid parameters for the “show” command are all, encoders, nops, exploits, payloads, auxiliary, plugins and options. Exploiting …

Exploitation, Metasploit, Vulnerabilities

Vulnerability scanning and Metasploit

A vulnerability scanner is an automated computer program designed to assess computers, computer systems, networks or applications and look for weaknesses. The program probes a system by sending data to it and analyzing the responses received. To identify any vulnerabilities on the target system, a vulnerability scanner uses its vulnerability database as reference. Don’t forget …

Metasploit, Passwords, Sniffing

Password sniffing with Metasploit

A packet sniffer is a computer program that intercepts and logs traffic passing over a network. The sniffer captures each packet, decodes the packet’s raw data, showing the values of various fields in the packet, and analyzes its content. If network communications are not encrypted (ssl) then it is possible to intercept communications and capture …

DoS, Metasploit

Denial Of Service attacks with Metasploit

A denial-of-service attack (DoS) is an attempt to make a machine or network resource unavailable to its intended users. Apache HTTP Server Apache httpd has been the most popular web server on the Internet since April 1996. It consists of thousand of lines of code and a vast variety of modules and extensions. Therefore, vulnerabilities …

Host discovery, Metasploit

Host Discovery with Metasploit

Host discovery is the process of identifying live hosts on a network. Alive is considered a host that responds to ping or have a particular port open. ARP Scanning ARP (Address Resolution Protocol) is a protocol for resolution of network layer addresses into link layer addresses. The ARP protocol is designed to allow it to …

Metasploit

Working with Metasploit scanners

Metasploit provides us with many scanning modules. To list the available scanners from within msfconsole, type info auxiliary/scanner/info auxiliary/scanner/ or search scannersearch scanner and hit tab to discover that MSF has over 240 scanners available.   HTTP Scanning There are many http scanners available in Metasploit. We are going to use the http_version scanner. Select …

Host discovery, Metasploit

OS fingerprinting with Metasploit

OS fingerprinting is the process of determining the operating system running by a host. Port 445 is used by SMB protocol for providing shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network. Most usage of SMB involves computers running Microsoft Windows. To check if port 445 is open, use …