Contents
◾
xiii
Metasploit Interfaces .......................................................................................................178
MSFConsole ...................................................................................................................178
MSFcli ...................................................................................................................179
MSFGUI ...............................................................................................................179
Armitage ................................................................................................................179
Metasploit Utilities .........................................................................................................179
MSFPayload ....................................................................................................................179
MSFEncode ....................................................................................................................179
MSFVenom ....................................................................................................................179
Metasploit Basic Commands ..........................................................................................180
Search Feature in Metasploit ...........................................................................................180
Use Command ................................................................................................................181
Info Command ...............................................................................................................181
Show Options .................................................................................................................181
Set/Unset Command ......................................................................................................182
Reconnaissance with Metasploit .....................................................................................182
Port Scanning with Metasploit .......................................................................................182
Metasploit Databases ......................................................................................................182
Storing Information from Nmap into Metasploit Database ............................................183
Useful Scans with Metasploit ..........................................................................................184
Port Scanners .........................................................................................................184
Specific Scanners ...................................................................................................184
Compromising a Windows Host with Metasploit ...........................................................184
Metasploit Autopwn .......................................................................................................188
db _ autopwn
in Action .............................................................................................188
Nessus and Autopwn ......................................................................................................189
Armitage ................................................................................................................189
Interface ..........................................................................................................................190
Launching Armitage .......................................................................................................190
Compromising Your First Target from Armitage ............................................................191
Enumerating and Fingerprinting the Target ...................................................................191
MSF Scans ......................................................................................................................192
Importing Hosts .............................................................................................................192
Vulnerability Assessment ................................................................................................193
Exploitation ....................................................................................................................193
Check Feature .................................................................................................................195
Hail Mary .......................................................................................................................196
Conclusion ......................................................................................................................196
References .......................................................................................................................196
Dostları ilə paylaş: