You can start Metasploit a couple of different ways, from the menu or from a terminal prompt.
● /Kali Linux/Top Ten Security Tools/Metasploit framework
● /Kali Linux/Exploitation Tools/Metasploit
● Or just “mfsconsole” in a terminal
here is screenshot that you type "msfconsole" in terminal :
Basically, using Metasploit to attack a target system usually involves:
1. Picking an Exploit
2. Setting Exploit Options
3. Picking a Payload
4. Setting Payload Options
5. Running the Exploit
6. Connecting to the Remote System
7. Performing Post Exploitation Processes
here is screenshot of the proccess:
vMost of the payloads are laid out in the format of ‘Operating System/Shell Type’ as shown below:
● set payload/osx/x86/shell_reverse_tcp (MacOS)
● set payload/linux/x64/shell_reverse_tcp (LinuxOS)
● set payload/windows/shell_reverse_tcp (WindowsOS)
● set payload/windows/meterpreter/reverse_tcp (WindowsOS)
and we need to create payload backdoor for windows
- LHOST is your Host IP_Address
- LPORT is you Port that you want to use
and the next we use to set all our exploit that we use to say above for exploit the backdoor
so we will get new Once connected to the session we are given a windows command prompt:
here victim computer drive we use to connected .everythings is gone .
thanks for your attending and i will show you later and i will try to post more tops as possible.
if you have any questions please comments below :p
0 comments:
Post a Comment