SlideShare a Scribd company logo
By : Parth Sahu
Nitish Babu
What is it?
• The Metasploit project is an open-source computer security project which
provides information about security vulnerabilities and aids in
penetration testing and development.
• Capabilities include smart exploitation, password auditing, web
application scanning, and social engineering. It has world’s largest
database of Public, tested exploits.
• As Metasploit is an open source where any one can use it. This
framework supports different operating systems like windows, Linux, Mac
OS x etc.
• Metasploit is a hacking framework written in ruby. It is designed to help
make writing and executing exploits as simple as possible. Requires no
knowledge of the software bug, or exploit machine code.
Penetration Testing
• It’s the process to identify security vulnerabilities in an application by
evaluating the system or network with various malicious techniques.
• Purpose of this test is to secure important data from outsiders like
hackers who can have unauthorized access to system.
• Once vulnerability is identified it is used to exploit system in order to
gain access to sensitive information.
• Causes of vulnerabilities:
1. Design and development errors.
2. Poor system configuration.
3. Human errors.
Terminologies and Definitions
• Vulnerability -A weakness which allows an attacker to break into or
compromise a system’s security. Like the main gate of house with a
weak lock (can be easily opened), a glass window of house (can be
easily broken) etc. Vulnerabilities in the systems make it easy for an
attacker to break into.
• Exploit – Code which allows an attacker to take advantage of a
vulnerability system. The set of different keys which he can try one
by one to open the lock, the hammer with him which he can use to
break the glass window etc can be the exploits.
Terminologies and Definitions
• Payload- Actual code which runs on the system after exploitation.
Now Finally after exploiting the vulnerability and breaking in , he
can have different things to do. He can Steal Money destroy the
things or just can give a look and come back. Deciding this is what
we mean by setting the Payload.
• Meterpreter- Meterpreter is an advanced, dynamically extensible
payload that uses in-memory DLL injection stagers and is extended
over the network at runtime. It communicates over the stager
socket and provides a comprehensive client-side Ruby API. It
features command history, tab completion, channels, and more.
Terminologies and Definitions
• Auxiliary’s- Typically, an Exploit without d Payload is called Auxiliary.
Used for scanning, fuzzing (providing invalid, unexpected, or random
data as inputs to a computer program), and some automated tasks.
• Encoders- To evade anti-viruses encoders are used. Payload’s are
encrypted.
• MSFconsole- Is an all-in-one interface to most of the features in
Metasploit. MSFconsole can be used to launch attacks, creating
listeners, and much, much more.
• Commands :- Show exploits, Show payloads, Show options, Use
exploit, set payload, Set LHOST, Set RHOST, Back, Info.
Steps of Attacking
1. Gather information about target system.
(like the device and model, its network connections, IP addresses
through Nmap and other sniffing tools and which ports and
services are open and which operating system is being used and
anything useful).
2. Based on above information choose the right exploit and set the
target information.
3. verify the exploit option to determine whether target is being
vulnerable to that exploit or not.
4. Select payload if needed.
5. Execute the exploit.
Finding Exploit
• Search directly in Metasploit database.
• Download from External Sources like:
www.exploit-db.com, 0day.today.
• Writing your own exploit:
Thank You

More Related Content

PPTX
PPTX
Metasploit framwork
PPTX
Metasploit
PPTX
Introduction To Exploitation & Metasploit
PPTX
Metasploit framework in Network Security
PDF
Nmap basics
PPTX
Metasploit (Module-1) - Getting Started With Metasploit
DOCX
Hacking'in Mavi Tarafı -2
Metasploit framwork
Metasploit
Introduction To Exploitation & Metasploit
Metasploit framework in Network Security
Nmap basics
Metasploit (Module-1) - Getting Started With Metasploit
Hacking'in Mavi Tarafı -2

What's hot (20)

PDF
Building infrastructure as code using Terraform - DevOps Krakow
PDF
Windows İşletim Sistemi Yetki Yükseltme Çalışmaları
PPTX
Penetration testing using metasploit
PPTX
Finalppt metasploit
PPTX
Trojans and backdoors
PPTX
Metasploit
PPTX
Dive in burpsuite
PPTX
Terraform
PDF
Burp suite
PPTX
Malware Classification and Analysis
PDF
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
PPTX
A5: Security Misconfiguration
PPTX
DVWA(Damn Vulnerabilities Web Application)
PPTX
NMAP - The Network Scanner
PPTX
Introduction to Metasploit
 
PPT
Windows internals
PPTX
Adversary Emulation using CALDERA
PDF
01 Metasploit kung fu introduction
Building infrastructure as code using Terraform - DevOps Krakow
Windows İşletim Sistemi Yetki Yükseltme Çalışmaları
Penetration testing using metasploit
Finalppt metasploit
Trojans and backdoors
Metasploit
Dive in burpsuite
Terraform
Burp suite
Malware Classification and Analysis
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
A5: Security Misconfiguration
DVWA(Damn Vulnerabilities Web Application)
NMAP - The Network Scanner
Introduction to Metasploit
 
Windows internals
Adversary Emulation using CALDERA
01 Metasploit kung fu introduction
Ad

Similar to Metasploit (20)

PPTX
BSides Algiers - Metasploit framework - Oussama Elhamer
PDF
Exploits Attack on Windows Vulnerabilities
PPTX
Pentesting with linux
PDF
Metasploitation part-1 (murtuja)
PPTX
Metasploit
PDF
24 33 -_metasploit
PDF
PPTX
Introduction to metasploit
 
PDF
Open Source Cyber Weaponry
PDF
Metasploit Computer security testing tool
PDF
Pen-Testing with Metasploit
PPTX
Introduction To Ethical Hacking
PPTX
metaploit framework
PDF
Metasploit - The Exploit Learning Tree
PPTX
Introduction to Exploitation
PDF
01_Metasploit - The Elixir of Network Security
DOCX
Backtrack Manual Part6
PDF
Metasploit Basics
DOCX
Backtrack Manual Part7
PPTX
Metasploit Framework and Payloads supported
BSides Algiers - Metasploit framework - Oussama Elhamer
Exploits Attack on Windows Vulnerabilities
Pentesting with linux
Metasploitation part-1 (murtuja)
Metasploit
24 33 -_metasploit
Introduction to metasploit
 
Open Source Cyber Weaponry
Metasploit Computer security testing tool
Pen-Testing with Metasploit
Introduction To Ethical Hacking
metaploit framework
Metasploit - The Exploit Learning Tree
Introduction to Exploitation
01_Metasploit - The Elixir of Network Security
Backtrack Manual Part6
Metasploit Basics
Backtrack Manual Part7
Metasploit Framework and Payloads supported
Ad

Recently uploaded (20)

PPTX
Current and future trends in Computer Vision.pptx
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPT
Occupational Health and Safety Management System
PPTX
Artificial Intelligence
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
introduction to high performance computing
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Current and future trends in Computer Vision.pptx
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Occupational Health and Safety Management System
Artificial Intelligence
Safety Seminar civil to be ensured for safe working.
introduction to high performance computing
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Exploratory_Data_Analysis_Fundamentals.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
86236642-Electric-Loco-Shed.pdf jfkduklg
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
R24 SURVEYING LAB MANUAL for civil enggi
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt

Metasploit

  • 1. By : Parth Sahu Nitish Babu
  • 2. What is it? • The Metasploit project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing and development. • Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. It has world’s largest database of Public, tested exploits. • As Metasploit is an open source where any one can use it. This framework supports different operating systems like windows, Linux, Mac OS x etc. • Metasploit is a hacking framework written in ruby. It is designed to help make writing and executing exploits as simple as possible. Requires no knowledge of the software bug, or exploit machine code.
  • 3. Penetration Testing • It’s the process to identify security vulnerabilities in an application by evaluating the system or network with various malicious techniques. • Purpose of this test is to secure important data from outsiders like hackers who can have unauthorized access to system. • Once vulnerability is identified it is used to exploit system in order to gain access to sensitive information. • Causes of vulnerabilities: 1. Design and development errors. 2. Poor system configuration. 3. Human errors.
  • 4. Terminologies and Definitions • Vulnerability -A weakness which allows an attacker to break into or compromise a system’s security. Like the main gate of house with a weak lock (can be easily opened), a glass window of house (can be easily broken) etc. Vulnerabilities in the systems make it easy for an attacker to break into. • Exploit – Code which allows an attacker to take advantage of a vulnerability system. The set of different keys which he can try one by one to open the lock, the hammer with him which he can use to break the glass window etc can be the exploits.
  • 5. Terminologies and Definitions • Payload- Actual code which runs on the system after exploitation. Now Finally after exploiting the vulnerability and breaking in , he can have different things to do. He can Steal Money destroy the things or just can give a look and come back. Deciding this is what we mean by setting the Payload. • Meterpreter- Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby API. It features command history, tab completion, channels, and more.
  • 6. Terminologies and Definitions • Auxiliary’s- Typically, an Exploit without d Payload is called Auxiliary. Used for scanning, fuzzing (providing invalid, unexpected, or random data as inputs to a computer program), and some automated tasks. • Encoders- To evade anti-viruses encoders are used. Payload’s are encrypted. • MSFconsole- Is an all-in-one interface to most of the features in Metasploit. MSFconsole can be used to launch attacks, creating listeners, and much, much more. • Commands :- Show exploits, Show payloads, Show options, Use exploit, set payload, Set LHOST, Set RHOST, Back, Info.
  • 7. Steps of Attacking 1. Gather information about target system. (like the device and model, its network connections, IP addresses through Nmap and other sniffing tools and which ports and services are open and which operating system is being used and anything useful). 2. Based on above information choose the right exploit and set the target information. 3. verify the exploit option to determine whether target is being vulnerable to that exploit or not. 4. Select payload if needed. 5. Execute the exploit.
  • 8. Finding Exploit • Search directly in Metasploit database. • Download from External Sources like: www.exploit-db.com, 0day.today. • Writing your own exploit: