The Metasploitable 2 system is an Ubuntu-based system. Its design was originally designed to be a demonstration of security tool testing and common vulnerability attacks. In this tutorial on Metasploit, we will enumerate the vulnerabilities related to the Metasploitable 2 system and exploit the vulnerabilities to collect and retrieve the information we need.Enumeration in mathematics or computer science ref
Downloadmetasploitable 22 Download Locations
Https://information.rapid7.com/metasploitable-download.html
https://sourceforge.net/projects/metasploitable/
0x01getting StartedUsername:msfadminPassword:msfadminUse ifconfig to view IP addresses and get IP 192.168.111.146about Kali I use the Kali in Win10, Ineed to install a lot of tools and libraries, I hope to do this write test can let my wi
Convert vmwarevm to KVM
Metasploitable only officially releases vmdk files, which can be opened directly with VMware. But how can it be used in KVM? It's helpless, but it's okay to solve the problem and make a format conversion.
Qemu-img convert-f vmdk-O qcow2 Metasploitable. vmdk Metasploitable. img
Qemu-img info Metasplo
Convert a vmwarevm to KVM and a vmwarevm to kvm.
Metasploitable only officially releases vmdk files, which can be opened directly with VMware. But how can it be used in KVM? It's helpless, but it's okay to solve the problem and make a format conversion.
Qemu-img convert-f vmdk-O qcow2 Metasploitable. vmdk Metasploitable. img
Qemu-img info
system first. The Kali is packaged in a Linux system. The Kali system is a bit of a system that has a large collection of good security tools and upgrades to these tools. It also contains the Metasploit. The Kali system is: http://www.kali.org/downloads/. If you have finished installing the Kali system, you can open the control window and use the following command to upgrade the Kali system.Upgrade directive: "Apt-get update apt-get Upgrade"Metasploitable
under a x86 schema. simply type on the command line: [emailprotected] ~ $ msfvenom-p linux/x86/meterpreter/reverse_tcp--payload-options
To see the parameter options for this payload: It is important to note that the arch option is used to represent the kernel architecture that the payload applies to, and if it is the kernel of the x86 architecture, it will work, but the kernel of the x64 architecture will not run. The kernel of the x86_64 architecture is the ability to run both 32-bi
Manual vulnerability MiningVulnerability type
#Directory Traversal directory Traversal "read files on this machine's operating system"
Users can read the Web root directory "default:/var/www/" Other operating system files (such as:/etc/passwd/) through the browser/url address or parameter variable contents. Root cause: Directory permissions are not strictly restricted
#File include file contains "1, include local file contains lfi;2, remote system file contains R
Attack environment: Target drone: metasploitable IP 192.168.162.129 attack kali2017 IP 192.168.162.128 Network Bridge I didn't start up when I opened it. Baidu said it was going to restart a Under Service networking service and reset msfdb that's the command service networking restartmsfdb InitThen do the following to start up there's definitely still a problem, but you can open it and use it first.Open Kali input Armitage will pop up such a small box
Free Metasploit Editions and trials of commercial Metasploit editions is self-supported by the user community. You can ask questions here, in the forums of the Rapid7 Community. Before, please search the forums to see if your question have already been answered or if it is included in the D Ocumentation.> Ask a question in the Rapid7 CommunityMetasploit Documentation
Common installation Issues FAQ (HTML)
Metasploit Installation Guide for Linux (PDF)
Metasploit Installation Guide for Linu
WebshellEssence: Windows platformChinese Kitchen Knife official website: Fat client program, domestic in relatively excellent webshell, applicability strong "But the version of a lot of chaos, there may be Trojans, said the official website http://www.maicaidao.co/"1, the use of upload vulnerability, first upload a sentence trojan "support three kinds of server-side PHP, ASP," ASP.Connect metasploitable using SSHCreate a file that contains a Trojan co
Acunetix WEB Vulnerability SCANNERAutomatic manual crawl, support Ajax, JavaScriptAcusensor Grey Box testDiscovery Crawl cannot discover filesAdditional vulnerability scanningThe source line number of the vulnerability can be foundSupport for PHP,. NET (injection of compiled. NET without source code)Generate PCI, 27001 standards, and compliance reportingNetwork scanFtp,dns,smtp,imap,pop3,ssh,snmp,telentIntegrated OpenVAS Scan Vulnerability[Email protected]:~# cp/media/sf_d_drive/acu_phpaspect.ph
Scan Tool-nikto#WEB渗透
Target drone: metasploitable
Shooting range: DVWA "default account/Password: Admin/password"
#新手先将DVWA的安全性, to the lowest, can be easily detected vulnerability
Reconnaissance "reduce interaction with target systems"
HTTrack: Download a Web-downloadable page to your computer and check for local "Kali installation"
# #可到此网站获取代理: hidemyass.com "free agent should be careful"
The metasploitable system only publishes VMDK files, which can be used directly with VMware, but how does it work with KVM? Very helpless Ah, fortunately there is a problem to solve, do a format conversionQemu-img convert-f vmdk-o qcow2 metasploitable.vmdk metasploitable.imgQEMU-IMG Info metasploitable.imgVmware2libvirt-f metasploitable.vmx > Metasploitable.xmlVirsh-c Qemu://system Define Metasploitable.xmlsudo virt-managerHaha, this can be used with
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.