Noirchapeau's Gitbook
Noirchapeau
Noirchapeau
  • Welcome to NoirChapeau Gitbook
  • Network Mapping and Security Auditing Tool
  • Footprinting - Enumeration and Information Gathering Notes
    • FTP Pentesting Notes
    • SMB Pentesting Notes
    • SSH Pentesting Notes
    • IPMI Pentesting Notes
    • Oracle TNS Pentesting Notes
    • MSSQL Pentesting Notes
    • MySQL Pentesting Notes
    • SNMP Pentesting Notes
    • IMAP/POP3 Pentesting Notes
    • SMTP Pentesting Notes
    • DNS Pentesting Notes
    • NFS Pentesting Notes
  • Web Reconnaissance Notes
  • Vulnerability Assessment Notes
    • Nessus Vulnerability Scanner Notes
    • OpenVAS (GVM) Vulnerability Scanner Notes
  • File Transfer Techniques for Pentesting
    • Advanced File Transfer Techniques
    • File Transfer Detection & Evasion Techniques
  • Shells & Payloads: Shell Overview
    • Shells & Payloads: Payloads Overview
    • Shells & Payloads: Web Shells Overview
    • Shells & Payloads: Detection & Prevention
  • Metasploit
    • Working with Metasploit Modules
    • Targets and Payloads
    • Encoders & Msfvenom: Advanced Exploitation Techniques
    • Database Management in Metasploit
    • Sessions and Jobs
    • Writing and Importing Custom Modules into Metasploit
    • Firewall and IDS/IPS Evasion
  • Password Attacks
    • Remote Password Attacks
    • Windows Local Password Attacks
    • Linux Local Password Attacks
    • Windows Lateral Movement
    • Files & Archives Cracking
    • Password Management
  • Interacting with Common Services
    • Protocol Specific Attacks
Powered by GitBook
On this page
  • What is Metasploit?
  • Metasploit Versions
  • Key Architecture Components
  • Key Advantages
  • msfconsole: The Core Interface

Metasploit

What is Metasploit?

Metasploit is a Ruby-based modular penetration testing platform designed for testing, creating, and executing exploits. It allows security professionals to identify and manage vulnerabilities through customizable scripts and a vast library of pre-built modules.

Core Functionalities:

  • Security vulnerability testing

  • Network enumeration

  • Exploitation and evasion techniques

  • Post-exploitation and persistent access

Metasploit Versions

  1. Metasploit Framework (Free)

    • Open-source and command-line-based.

    • Offers complete access to modules and functionalities for manual and semi-automated testing.

  2. Metasploit Pro (Paid) Enhanced with the following features:

    • Automation: Chains, replay functionality, and quick-start wizards.

    • Vulnerability Validation: Nexpose integration, credential management, and scanning.

    • Social Engineering Tools: Phishing campaigns and team collaboration.

    • Reporting: Web-based GUI with tagging and evidence collection.

Key Architecture Components

  • Default Installation Path: /usr/share/metasploit-framework

  • Primary Directories:

    • Data, Documentation, and Lib: Core operational files and references.

    • Modules: Contains scripts organized by category:

      /modules/
        - auxiliary
        - encoders
        - evasion
        - exploits
        - nops
        - payloads
        - post
    • Plugins: Extend functionality. Examples: openvas.rb, sqlmap.rb.

    • Scripts: Tools for Meterpreter, automation, and shell scripting, located in /scripts/.

    • Tools: Command-line utilities for specific tasks:

      /tools/
        - exploit
        - password
        - recon

Key Advantages

  • Modularity: Switch seamlessly between exploits, payloads, and post-exploitation tools.

  • Automation: Automate repetitive tasks, reducing manual intervention.

  • Flexibility: Integrates with external tools like Nexpose and SQLMap.

  • User-Friendly: Features such as tab completion, command chaining, and organized modules enhance usability.

msfconsole: The Core Interface

The msfconsole is the centralized command-line interface for Metasploit. It provides a stable, feature-rich environment to interact with the framework.

Key Features:

  • Full access to modules, session management, and job control.

  • Tab completion for commands and options.

  • Silent mode for discrete operations:

    msfconsole -q

Commands Overview:

Command
Description

search <term>

Search for modules.

use <module_path>

Load a specific module.

show options

View required and optional parameters.

set <option> <value>

Configure a parameter.

exploit or run

Execute the loaded module.

PreviousShells & Payloads: Detection & PreventionNextWorking with Metasploit Modules