Learning Metasploit and configuring my virtual hacking Lab
OK, it’s time for me to begin my discovery of Metasploit. This is a framework tool for developing and executing exploit code against remote target machines. I’ve read Metasploit should be used like a...
View ArticleInformation Gathering: Nmap Network Port Scanning
Both The Basics of Hacking and Penetration Testing and Metasploit: The Penetration Tester’s Guide introduce us early on to the port scanner Nmap. Nmap Network Scanning describe the tool thus: Nmap...
View ArticleMetasploit Server Message Block Scanner: smb_version module
Metasploit has an inbuilt ‘targeted’ scanner designed specifically to attempt to identify Microsoft Windows versions on networks, called smb_version module. SMB stands for Server Message Block and Wiki...
View ArticleMetasploit Microsoft SQL Server Scanner: mssql_ping
Metasploit has an inbuilt module – mssql_ping – designed specifically to scan for Microsoft SQL servers on a network. So, let’s see how it performs against my Virtual Hacking Lab. msf > use...
View ArticleMetasploit FTP Scanner: ftp_version Module
Metasploit has an inbuilt module – ftp_version – designed specifically to scan for File Transfer Protocol services (FTP) on a network. Let’s see how it performs against my Virtual Hacking Lab: msf >...
View ArticleMetasploit Basic Vulnerability Scan: Netcat Banner Grabbing
It is possible to write a custom scanner using Metasploit Framework ‘mixins’ and Ruby programming, but that’s too advanced for me and so I will conduct a simple vulnerability scan on my Virtual Hacking...
View ArticleNessus Vulnerability Scan of My Virtual Hacking Lab
Following my previous post I got a chance to check out Nessus against the Windows portion of my Virtual Hacking Lab. I set up a new policy within Nessus and ensured “Enable All” within the Policy...
View ArticleMetasploit SMB Login Check Scanner
Just tried out the Metasploit username and password checker: SMB Login Check Scanner against my Virtual Hacking Lab. I confess that I’m unsure as to the practical applications of this feature, as the...
View ArticleMy First Metasploit Exploit
I shall attempt my first exploit and target the Windows portion of my Virtual Hacking Lab. I’m following instructions given in Chapter 5 (The Joy of Exploitation) of Metasploit: The Penetration...
View ArticleMetasploit The Penetration Tester’s Guide – Ubuntu 9.04 Heap-Based Samba Exploit
Just a quick post to identify a frustrating problem in Metasploit: The Penetration Tester’s Guide. Chapter five – The Joy of Exploitation – “Exploiting an Ubuntu Machine” simply doesn’t work. The book...
View ArticleMetasploit All-Ports Payloads: Brute Forcing Ports
I’m targeting ports on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 5 (The Joy of Exploitation) of Metasploit: The Penetration Tester’s Guide. The exploitee...
View ArticleMetasploit: Exploiting MS SQL Server: Fast-Track, mssql_ping, mssql_login,...
I’m targeting the MS MSQL Server on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 6 (Meterpreter) of Metasploit: The Penetration Tester’s Guide. The...
View ArticleMetasploit Meterpreter Shell: Screenshot, sysinfo, ps, migrate, keylog_recorder
This post follows on from a previous post in which the target machine was exploited and a Meterpreter shell obtained. First to export an image of the target machine’s desktop: meterpreter >...
View ArticleMetasploit Meterpreter: Using ps and stealing Kerberos tokens
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Run VNC
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Sniffing traffic on exploited system – Packetrecorder
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Creating a persistent backdoor connection
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Migrate a process and obtain system password hashes
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Killing Antivirus Software on Exploited System – Killav
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleLearning Nmap Security Network Port Scanner: TCP FIN, NULL and Xmas Tree Scans
This is the ninth post detailing my notes on Nmap Network Scanning. The TCP FIN, NULL and Xmas Tree Scans exploit a loophole in TCP RFC: The TCP RFC says that if a closed port receives a packet that...
View Article