2021-08-30 01:01:28
#black_hacker
System hacking Tools
1. MetaSploit
The Metasploit Framework is a penetration testing toolkit, exploit development
platform, and research tool that includes hundreds of working remote exploits
for a variety of platforms.
? It supports fully automated exploitation of web servers, by abusing known
vulnerabilities and leveraging weak passwords via Telnet, SSH, HTTP, and
SNMP
type of MetaSploit Module
? Metasploit Exploit Module
? It is the basic module in Metasploit used to encapsulate an exploit using
which users target many platforms with a single exploit.
? This module comes with simplified meta-information fields.
? Using a Mixins feature, users can also modify exploit behavior
dynamically, brute force attacks, and attempt passive exploits.
? Steps to exploit a system follow the Metasploit Framework:
? Configuring Active Exploit
? Verifying the Exploit Options
? Selecting a Target
? Selecting the Payload
? Launching the Exploit
? Metasploit Payload Module
? Payload module establishes a communication channel between the
Metasploit framework and the victim host.
? It combines the arbitrary code that is executed as the result of an exploit
succeeding.
? To generate (stageless) payloads, first select a payload using the
command:
? msf > use windows/shell_reverse_tcp
? msf payload(shell_reverse_tcp) > generate -h
? There are four types of payload modules provides by the Metasploit:
? Singles: It is self-contained, fire-and-forget, completely standalone.
? Stagers: It sets up a network connection between the attacker and
victim.
? Stages: It is downloaded by stagers modules.
? Stageless(New): The entire payload is sent in one hit and executed
on the target machine
Metasploit Auxiliary Module
? Metasploit's auxiliary modules can be used to perform arbitrary, one-off
actions such as port scanning, denial of service, and even fuzzing.
? To run auxiliary module, either use the run command, or use the exploit
command
? Metasploit NOPS Module
? NOP modules generate a no-operation instructions used for blocking out
buffers.
? Use generate command to generate a NOP sled of an arbitrary size and
display it in a given format OPTIONS:
? -b < opt>: The list of characters to avoid: '\x00\xff'
? -h: Help banner
? -s < opt>: The comma separated list of registers to save
? -t < opt>: The output type: ruby, perl, c, or raw msf nop(opty2)>
@black_hat_hacker_master
Share Our Channel and Support US
111 views22:01