Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
43 views

Hunting For Vulnerabilities Using Metasploit

The document discusses using Metasploit and related tools to hunt for vulnerabilities. It covers using the Searchsploit tool to search the built-in exploit database for exploits based on vulnerabilities or software versions. It also discusses searching online vulnerability databases like NVD and Rapid7. The document demonstrates integrating Nmap scanning into Metasploit to gather host and service information about targets which is stored in Metasploit's backend database.

Uploaded by

Kshitiz Goyal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Hunting For Vulnerabilities Using Metasploit

The document discusses using Metasploit and related tools to hunt for vulnerabilities. It covers using the Searchsploit tool to search the built-in exploit database for exploits based on vulnerabilities or software versions. It also discusses searching online vulnerability databases like NVD and Rapid7. The document demonstrates integrating Nmap scanning into Metasploit to gather host and service information about targets which is stored in Metasploit's backend database.

Uploaded by

Kshitiz Goyal
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Hunting for Vulnerabilities using Metasploit

Steps:
1. Installing Nessus in Kali
Exploit Dataset

 Predefined in system (kali machine)


 For a particular vulnerability what are the exploits available
 In the inbuilt exploit database, we are going to perform searches based on
manual method
 For a particular vulnerability how to find exploits
 Tool used here is SEARCHxploit
 Command line search tool
# searchsploit –h
We are going to work with Apache based vulnerability that Apache should be windows
based attack and local attack
#Searchsploit windows remote

All are windows based remote exploits


#searchsploit ssh local
#searchsploit apache remote

All are Apache based remote exploits

Assume you are going to attack windows machine because it has old patch
file(software’s security update is outdated) in it. For this to be performed you need
an exploit but you don’t know the name of exploit but you know the patch number
#searchsploit MS14-040

There are 2 exploits both are local exploits. It’s used for privilege escalation i.e
to bring admin rights
We can search even with version no.
#searchsploit ftp 2.3.4
Searching exploits Online
Search in google vulnerability database

NVD – database
In search vulnerability database, we can search for vulnerabilities

Based on the keyword we can get information about the vulnerability present.
It provides information based on severity and complete description will also be
present.

To find information about any company’s product or vulnerabilities in their company


that can be obtained here
Eg: Tomcat
Click vulnerabilities

You can try for SSH till 2022 with CVE details.
You can also try with Rapid7 vulnerability database with FTP

Nmap Approach
To check how Nmap scanning approach in Metasploit’s.

All the results of the scanning performed through Nmap will be stored in Metasploit’s
backend Database which will be useful when we try later to perform any attack. It’s
like a knowledge base.

It’s not necessary to scan Nmap always and check. All those information can be
integrated to Metasploit’s, so if u want any information about target you can get it
from Metasploit’s itself.

We can use Nmap in our Metasploit’s itself.


Msf5> db_nmap –sT –sV –v (metasploitable2 ip)
-sT – information about TCP

-sV – version of TCP


-v - Verbose

Msf5> hosts

The scanned IP , its OS information, its purpose all those will be obtained and its
stored in backend database of Metasploit’s.
To gather information about target host.
Msf5> services

These are the options of the scanned target host.


We need not scan again and again it will be stored in the database.
This is the way of scanning target using Nmap through Metasploit.

You might also like