Quantcast
Channel: Pax Pentest » Virtual Hacking Lab
Browsing all 34 articles
Browse latest View live

Learning Metasploit and configuring my virtual hacking Lab

OK, it’s time for me to begin my discovery of Metasploit. This is a framework tool for developing and executing exploit code against remote target machines. I’ve read Metasploit should be used like a...

View Article



Information Gathering: Nmap Network Port Scanning

Both The Basics of Hacking and Penetration Testing and Metasploit: The Penetration Tester’s Guide introduce us early on to the port scanner Nmap. Nmap Network Scanning describe the tool thus: Nmap...

View Article

Metasploit Server Message Block Scanner: smb_version module

Metasploit has an inbuilt ‘targeted’ scanner designed specifically to attempt to identify Microsoft Windows versions on networks, called smb_version module. SMB stands for Server Message Block and Wiki...

View Article

Metasploit Microsoft SQL Server Scanner: mssql_ping

Metasploit has an inbuilt module – mssql_ping – designed specifically to scan for Microsoft SQL servers on a network. So, let’s see how it performs against my Virtual Hacking Lab. msf > use...

View Article

Metasploit FTP Scanner: ftp_version Module

Metasploit has an inbuilt module – ftp_version – designed specifically to scan for File Transfer Protocol services (FTP) on a network. Let’s see how it performs against my Virtual Hacking Lab: msf >...

View Article


Metasploit Basic Vulnerability Scan: Netcat Banner Grabbing

It is possible to write a custom scanner using Metasploit Framework ‘mixins’ and Ruby programming, but that’s too advanced for me and so I will conduct a simple vulnerability scan on my Virtual Hacking...

View Article

Nessus Vulnerability Scan of My Virtual Hacking Lab

Following my previous post I got a chance to check out Nessus against the Windows portion of my Virtual Hacking Lab. I set up a new policy within Nessus and ensured “Enable All” within the Policy...

View Article

Metasploit SMB Login Check Scanner

Just tried out the Metasploit username and password checker: SMB Login Check Scanner against my Virtual Hacking Lab. I confess that I’m unsure as to the practical applications of this feature, as the...

View Article


My First Metasploit Exploit

I shall attempt my first exploit and target the Windows portion of my Virtual Hacking Lab. I’m following instructions given in Chapter 5 (The Joy of Exploitation) of Metasploit: The Penetration...

View Article


Metasploit The Penetration Tester’s Guide – Ubuntu 9.04 Heap-Based Samba Exploit

Just a quick post to identify a frustrating problem in Metasploit: The Penetration Tester’s Guide. Chapter five – The Joy of Exploitation – “Exploiting an Ubuntu Machine” simply doesn’t work. The book...

View Article

Metasploit All-Ports Payloads: Brute Forcing Ports

I’m targeting ports on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 5 (The Joy of Exploitation) of Metasploit: The Penetration Tester’s Guide. The exploitee...

View Article

Metasploit: Exploiting MS SQL Server: Fast-Track, mssql_ping, mssql_login,...

I’m targeting the MS MSQL Server on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 6 (Meterpreter) of Metasploit: The Penetration Tester’s Guide. The...

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter Shell: Screenshot, sysinfo, ps, migrate, keylog_recorder

This post follows on from a previous post in which the target machine was exploited and a Meterpreter shell obtained. First to export an image of the target machine’s desktop: meterpreter >...

View Article


Metasploit Meterpreter: Using ps and stealing Kerberos tokens

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Run VNC

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article


Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Sniffing traffic on exploited system – Packetrecorder

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Metasploit Meterpreter: Creating a persistent backdoor connection

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article


Metasploit Meterpreter: Migrate a process and obtain system password hashes

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Metasploit Meterpreter: Killing Antivirus Software on Exploited System – Killav

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Learning Nmap Security Network Port Scanner: TCP FIN, NULL and Xmas Tree Scans

This is the ninth post detailing my notes on Nmap Network Scanning. The TCP FIN, NULL and Xmas Tree Scans exploit a loophole in TCP RFC: The TCP RFC says that if a closed port receives a packet that...

View Article
Browsing all 34 articles
Browse latest View live




Latest Images