SlideShare a Scribd company logo
The Metasploit
        Framework
By Elhamer Oussama Abdelkhalek
Contents :
• Introduction :
I. Basics .
II. Running an attack The old fashioned way .
III. Overview of the metasploit project and framework
IV. Run the same attack using metasploit .
• Metasploit overview and Basic framework usage .
I. Metasploit Architechture .
II. Consols .
• MeterPreter basics and overView
Exploitation !
• Vulnerability : a weakness which allow an attacker to braek
  into a system security.
• Exploit : code which allow attacker to take advantage of a
  vulnerable system
• Payload : A code that Run On the System After Exploitation
-Vunerability
-Exploit
-Payload
1. Exploit RunsFirst
 2. PayLoad Runs NextIf Exploit Succeed




                                    Exploit + Payload




                                     Data DownLooad
VulnerableSystem                                            Attacker
                                     Uploading Malwares …
Run an Exploit The Old Fashion Way
.The Vulnerability : RPCDCOM
   The Buffer Overflow In Rcp Interface ;
.The Exploit And The PayLoad are Availble ;
The Problem !
• A Lot Of Exploits !
• Hard To Cutomize The Payload .
• Testing exploit Research is Painfull !.




• Metasploit is a Short Cut 
What Is Metasploit ?
• Metasploit has come to be synonymous with the Metasploit
  Framework.
• The Metasploit Project Whose goal is to provide information that
   will be useful in
I.    Pentration Testing.
II. IDS Signature.
I.   exploit research.
• Developped By H.D Moor 2003 then acquired by Rapid7
• Primarily written in perl,
• Then Rewritten in Ruby ‘Largest proGramme Even Wrotte In Ruby’ !!
• The framework is an open-source platform for developing, testing
  and using exploit code.
• The current “stable” version is version 4
• Similar to the commercial projects Canvas (Immunity) and Impact
  (Core)
Benefits
• Over 600 tested exploits and 200 payloads !
• Plug and play of payloads with exploits
   -matching the Payload whith The Exloit
   -Try different Payload with The Same Exploit Code .
• Lot Of Tools and Features For better And Faster pentests
Using Metasploit
 • Show – list modules available (exploits, payloads, etc)
 • Use – Use a specific exploit module
 • Set – set specific variables (Case sensitive)
    • RHOST – Remote Host (who we’re attacking)
    • PAYLOAD – The payload to carry
    • LHOST – Local Host (for the phone home attacks, reverse shell)
 • Exploit – run the exploit.




 • RpcDcom Using Metasploit.
Using Metasploit :
Metasploit Architecture:
MeterPreter
•   What We Are Looking For is a Payload which :
•    - Avoid Creation of a new Process .
•   - Should Run in The Exploited process’ Context.
•   - Should Not Created a new File On disk .
•   - Import More Functionality (extending ) and not Be Limited
    Whith The Created Remote Shell Commande .




•     - That Exactly What MeterPreter Do !
Meterpreter Basics

•   Post exploitation Tool
•   Woks by using in memory DLL injection
•   Does Not Create any files on disk
•   Uses encrypted communication between Client and Attacker
•   Stable ,Flexible and Extensible !
•   Can be extended at runtime by shipping dlls To the Victime
How It Works
•   When The Exploit Succeed
•   Exploit and Run The First PayLoad 
•   PayLoad Connectes Back To Msf 
•   2nd Stage Dll Injection Payload Sent 
•   Msf Sends Merterpreter Server Dll
•   Client And Server Communication 
Using Meterpreter
• DEMO
Client Server Communication
In Meterpreter
• The Communication Is Encrypted .
• In The Form of TlVs (Type Length Value).
• So Multiple Channels Of communication can use the same
  client –server connection .
• Allow For multiple programs running on the victim to
  communicate at the same Time .
• Demo.

More Related Content

PPTX
Metasploit for Web Workshop
PPTX
Metasploit For Beginners
DOCX
Boot-To-Root KIOPTRIX Level -1
PDF
Metaploit
PPTX
Metasploit - Basic and Android Demo
PPTX
Fileless Malware [Cyber Security]
PDF
Virtual Machine Introspection in a Hyberid Honeypot Architecture
Metasploit for Web Workshop
Metasploit For Beginners
Boot-To-Root KIOPTRIX Level -1
Metaploit
Metasploit - Basic and Android Demo
Fileless Malware [Cyber Security]
Virtual Machine Introspection in a Hyberid Honeypot Architecture

What's hot (20)

PDF
Metasploit - The Exploit Learning Tree
PPTX
Metasploit framwork
PPTX
Practical Windows Kernel Exploitation
PDF
Is That A Penguin In My Windows?
PPTX
Metasploit Railguns presentation @ tcs hyderabad
PPTX
Finalppt metasploit
PPTX
Penetration testing using metasploit
PDF
Pentest with Metasploit
PDF
SSMF (Security Scope Metasploit Framework) - Course Syllabus
PPTX
Metasploit & Windows Kernel Exploitation
PPTX
Metasploit
PPTX
Linux and windows
PPTX
Metasploit (Module-1) - Getting Started With Metasploit
PPT
Automated Penetration Testing With The Metasploit Framework
PDF
The State of the Veil Framework
PDF
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
PDF
AV Evasion with the Veil Framework
PDF
NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning
PDF
Veil-Ordnance
PDF
Malware Collection and Analysis via Hardware Virtualization
Metasploit - The Exploit Learning Tree
Metasploit framwork
Practical Windows Kernel Exploitation
Is That A Penguin In My Windows?
Metasploit Railguns presentation @ tcs hyderabad
Finalppt metasploit
Penetration testing using metasploit
Pentest with Metasploit
SSMF (Security Scope Metasploit Framework) - Course Syllabus
Metasploit & Windows Kernel Exploitation
Metasploit
Linux and windows
Metasploit (Module-1) - Getting Started With Metasploit
Automated Penetration Testing With The Metasploit Framework
The State of the Veil Framework
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
AV Evasion with the Veil Framework
NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning
Veil-Ordnance
Malware Collection and Analysis via Hardware Virtualization
Ad

Viewers also liked (20)

PDF
Metasploit Humla for Beginner
PDF
Metasploit for Penetration Testing: Beginner Class
PPTX
Tranning-2
PDF
Webinar Metasploit Framework - Academia Clavis
PPTX
Metasploit for information gathering
PPTX
Slide Palestra "Metasploit Framework"
PDF
Alphorm.com Support de la formation Hacking et Sécurité Metasploit
PPTX
Basic Metasploit
PDF
La Quadrature Du Cercle - The APTs That Weren't
PDF
Metasploit: Pwnage and Ponies
PDF
Penetration test
PPT
Metasploit-TOI-Ebryx-PVT-Ltd
PDF
Informationssicherheit im Übersetzungsprozess
PPTX
Static PIE, How and Why - Metasploit's new POSIX payload: Mettle
PPTX
Slide curso metasploit
PDF
Scrum Überblick Teil 1
PDF
Oscp preparation
PDF
Network Packet Analysis
PPT
Writing Metasploit Plugins
PDF
Pen-Testing with Metasploit
Metasploit Humla for Beginner
Metasploit for Penetration Testing: Beginner Class
Tranning-2
Webinar Metasploit Framework - Academia Clavis
Metasploit for information gathering
Slide Palestra "Metasploit Framework"
Alphorm.com Support de la formation Hacking et Sécurité Metasploit
Basic Metasploit
La Quadrature Du Cercle - The APTs That Weren't
Metasploit: Pwnage and Ponies
Penetration test
Metasploit-TOI-Ebryx-PVT-Ltd
Informationssicherheit im Übersetzungsprozess
Static PIE, How and Why - Metasploit's new POSIX payload: Mettle
Slide curso metasploit
Scrum Überblick Teil 1
Oscp preparation
Network Packet Analysis
Writing Metasploit Plugins
Pen-Testing with Metasploit
Ad

Similar to BSides Algiers - Metasploit framework - Oussama Elhamer (20)

PPTX
Metasploit
PPTX
Metasploit
PPTX
Introduction To Exploitation & Metasploit
PDF
PPTX
Pentesting with linux
PDF
Metasploitation part-1 (murtuja)
PPTX
Metasploit
PPTX
Introduction to Metasploit
 
PDF
Metasploit Computer security testing tool
PPTX
Introduction to metasploit
 
PPTX
Metasploit Framework and Payloads supported
PDF
24 33 -_metasploit
PPTX
Introduction of Metasploit and task.pptx
PDF
Exploits Attack on Windows Vulnerabilities
PPTX
Metasploit framework in Network Security
PDF
Open Source Cyber Weaponry
PDF
Introduction to Metasploit
PDF
01 Metasploit kung fu introduction
PPTX
metaploit framework
Metasploit
Metasploit
Introduction To Exploitation & Metasploit
Pentesting with linux
Metasploitation part-1 (murtuja)
Metasploit
Introduction to Metasploit
 
Metasploit Computer security testing tool
Introduction to metasploit
 
Metasploit Framework and Payloads supported
24 33 -_metasploit
Introduction of Metasploit and task.pptx
Exploits Attack on Windows Vulnerabilities
Metasploit framework in Network Security
Open Source Cyber Weaponry
Introduction to Metasploit
01 Metasploit kung fu introduction
metaploit framework

More from Shellmates (15)

PPTX
Cryptography basics
PPTX
HTML basics
PDF
Malware Analysis par Mohamed Ali FATHI - BSides Algiers 2k15
PDF
Atelier Python 2eme partie par Achraf Kacimi El Hassani
PPTX
JavaScript 1.0 by Zakaria Smahi
PDF
Introduction à Python - Achraf Kacimi El Hassani
PPTX
BSides Algiers - Stuxnet - Sofiane Talmat
PDF
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
PPTX
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
PPTX
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
ODP
BSides Algiers - Nmap Scripting Engine - Hani Benhabiles
PDF
BSides Algiers - Normes ISO 2700x - Badis Remli
PDF
BSides Algiers - PHP Static Code Analysis - Abdeldjalil Belakhdar
PDF
BSides Algiers - Certification Electronique - Lilia Ounini
PPTX
BSides algiers - Malware History - Sofiane Talmat
Cryptography basics
HTML basics
Malware Analysis par Mohamed Ali FATHI - BSides Algiers 2k15
Atelier Python 2eme partie par Achraf Kacimi El Hassani
JavaScript 1.0 by Zakaria Smahi
Introduction à Python - Achraf Kacimi El Hassani
BSides Algiers - Stuxnet - Sofiane Talmat
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
BSides Algiers - Nmap Scripting Engine - Hani Benhabiles
BSides Algiers - Normes ISO 2700x - Badis Remli
BSides Algiers - PHP Static Code Analysis - Abdeldjalil Belakhdar
BSides Algiers - Certification Electronique - Lilia Ounini
BSides algiers - Malware History - Sofiane Talmat

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Empathic Computing: Creating Shared Understanding
PDF
KodekX | Application Modernization Development
PDF
Network Security Unit 5.pdf for BCA BBA.
Programs and apps: productivity, graphics, security and other tools
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Review of recent advances in non-invasive hemoglobin estimation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Understanding_Digital_Forensics_Presentation.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Dropbox Q2 2025 Financial Results & Investor Presentation
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
sap open course for s4hana steps from ECC to s4
Empathic Computing: Creating Shared Understanding
KodekX | Application Modernization Development
Network Security Unit 5.pdf for BCA BBA.

BSides Algiers - Metasploit framework - Oussama Elhamer

  • 1. The Metasploit Framework By Elhamer Oussama Abdelkhalek
  • 2. Contents : • Introduction : I. Basics . II. Running an attack The old fashioned way . III. Overview of the metasploit project and framework IV. Run the same attack using metasploit . • Metasploit overview and Basic framework usage . I. Metasploit Architechture . II. Consols . • MeterPreter basics and overView
  • 3. Exploitation ! • Vulnerability : a weakness which allow an attacker to braek into a system security. • Exploit : code which allow attacker to take advantage of a vulnerable system • Payload : A code that Run On the System After Exploitation
  • 5. 1. Exploit RunsFirst 2. PayLoad Runs NextIf Exploit Succeed Exploit + Payload Data DownLooad VulnerableSystem Attacker Uploading Malwares …
  • 6. Run an Exploit The Old Fashion Way .The Vulnerability : RPCDCOM The Buffer Overflow In Rcp Interface ; .The Exploit And The PayLoad are Availble ;
  • 7. The Problem ! • A Lot Of Exploits ! • Hard To Cutomize The Payload . • Testing exploit Research is Painfull !. • Metasploit is a Short Cut 
  • 8. What Is Metasploit ? • Metasploit has come to be synonymous with the Metasploit Framework. • The Metasploit Project Whose goal is to provide information that will be useful in I. Pentration Testing. II. IDS Signature. I. exploit research. • Developped By H.D Moor 2003 then acquired by Rapid7 • Primarily written in perl, • Then Rewritten in Ruby ‘Largest proGramme Even Wrotte In Ruby’ !! • The framework is an open-source platform for developing, testing and using exploit code. • The current “stable” version is version 4 • Similar to the commercial projects Canvas (Immunity) and Impact (Core)
  • 9. Benefits • Over 600 tested exploits and 200 payloads ! • Plug and play of payloads with exploits -matching the Payload whith The Exloit -Try different Payload with The Same Exploit Code . • Lot Of Tools and Features For better And Faster pentests
  • 10. Using Metasploit • Show – list modules available (exploits, payloads, etc) • Use – Use a specific exploit module • Set – set specific variables (Case sensitive) • RHOST – Remote Host (who we’re attacking) • PAYLOAD – The payload to carry • LHOST – Local Host (for the phone home attacks, reverse shell) • Exploit – run the exploit. • RpcDcom Using Metasploit.
  • 13. MeterPreter • What We Are Looking For is a Payload which : • - Avoid Creation of a new Process . • - Should Run in The Exploited process’ Context. • - Should Not Created a new File On disk . • - Import More Functionality (extending ) and not Be Limited Whith The Created Remote Shell Commande . • - That Exactly What MeterPreter Do !
  • 14. Meterpreter Basics • Post exploitation Tool • Woks by using in memory DLL injection • Does Not Create any files on disk • Uses encrypted communication between Client and Attacker • Stable ,Flexible and Extensible ! • Can be extended at runtime by shipping dlls To the Victime
  • 15. How It Works • When The Exploit Succeed • Exploit and Run The First PayLoad  • PayLoad Connectes Back To Msf  • 2nd Stage Dll Injection Payload Sent  • Msf Sends Merterpreter Server Dll • Client And Server Communication 
  • 17. Client Server Communication In Meterpreter • The Communication Is Encrypted . • In The Form of TlVs (Type Length Value). • So Multiple Channels Of communication can use the same client –server connection . • Allow For multiple programs running on the victim to communicate at the same Time . • Demo.