Hunting For Vulnerabilities Using Metasploit
Hunting For Vulnerabilities Using Metasploit
Steps:
1. Installing Nessus in Kali
Exploit Dataset
Assume you are going to attack windows machine because it has old patch
file(software’s security update is outdated) in it. For this to be performed you need
an exploit but you don’t know the name of exploit but you know the patch number
#searchsploit MS14-040
There are 2 exploits both are local exploits. It’s used for privilege escalation i.e
to bring admin rights
We can search even with version no.
#searchsploit ftp 2.3.4
Searching exploits Online
Search in google vulnerability database
NVD – database
In search vulnerability database, we can search for vulnerabilities
Based on the keyword we can get information about the vulnerability present.
It provides information based on severity and complete description will also be
present.
You can try for SSH till 2022 with CVE details.
You can also try with Rapid7 vulnerability database with FTP
Nmap Approach
To check how Nmap scanning approach in Metasploit’s.
All the results of the scanning performed through Nmap will be stored in Metasploit’s
backend Database which will be useful when we try later to perform any attack. It’s
like a knowledge base.
It’s not necessary to scan Nmap always and check. All those information can be
integrated to Metasploit’s, so if u want any information about target you can get it
from Metasploit’s itself.
Msf5> hosts
The scanned IP , its OS information, its purpose all those will be obtained and its
stored in backend database of Metasploit’s.
To gather information about target host.
Msf5> services