Metasploit | A guide for beginners and newbies.

If you have interest in hacking then I feel metasploit framework platfrom is very essential to know and implement.It is used by security reseachers,Pentesters,Hackers,script kiddes etc.So,in this tutorial I will discuss few basics of metasploit and its architecture.So lets start....
I recommend readers if they abide by the blog's Disclaimer then they can proceed reading this post otherwise leave this page immediately.

What is metasploit?

It is an exploitation framework written in ruby language used for devloping and executing exploits on a remote host after assessing the vulnerability.It has a wide range of pre developed exploits and few useful applications like "nmap" attached with it.It was primarily developed for penetration testing but now it has come out to be must needed tool for hackers.

Note:All the screen shots in this post are from Windows OS.

Image Credit:HD Moore

Basic Terms:

It is similar to a vehicle in real life that helps in entering or penetrating to a system because of any vulnerability or any flaw in the system.

Its specifies the work of the exploit

These are few other applications combined with the framework like sniffers,enumeration tool.

It is a payload that is injected into a process of an exploited system where no additional process is created in the memory and later it can be migrated to any desired process using PID(Process ID.)

Exploits are sometimes detected by anti-virus so these encoders can be used to make the exploits undetectable and manipulate the code.

Known as no operation generators are helpful in letting the exploit remain undetected from IDS.

The extend the functionality of the cosole.

Basic Commands:
As the name signifies it will show some commands for reference.
If you want to search an exploit and donot know the excat name then.For example search windows as shown in the image below.

After the desired exploit has been sorted out then use this command to select he particular exploit as shown in the image below.

If you want to use a particular option once then this command is used as shown in the image below. options:
If this command is used then it will show the options of the exploit.What port to be used etc...

It is same as "set" but the "g" stands for global so if you want to use a particular option for the complete session then use this command. :
Only "show" command will display all the exploits,payload and auxillaries at a time on the screen but if used as "show payloads" etc will show only the payloads as shown in the image below. :
It displays the needed information about an exploit or payload.

After every thing is set this command is used to run the exploit.

10.sessions:session -i,session -i <1,2,>:
After the exploit is succesful then to see the sessions this command is used and then the ID is used to select a specific one.
Suppose a meterpreter session is running successfully then "Ps" will display the processes running in the exploited system.

12.migrate :
It somtimes happens that the process to which the meterpreter is being injected is a temporary process so here the migrate command can be used to tranfer the meterpreter to some other process by specifing the process id.

You can setup a "Pentesting Environment" at your home using Virtual environment,find out here.

For more information on Metasploit visit here.

"If you find this post useful and informative do post your comment and share it."
Suggest Article

Subscribe to Posts....

Enter your Email-ID and get "Security Tips and Hacking Tutorials"alert in your inbox,we promise to keep your email private and safe.

comment 9 comments:

Shekhar Sahu on November 6, 2010 at 2:00 AM said...

Oh this frame works seems to be cool!

Penelope@nurses uniforms on November 10, 2010 at 8:52 AM said...

The info that you had given can be used not just by the newbies but even by the script kiddies. I think this app/tool can be utilize only if the hacker had already search the vulnerability of the program that he/she wants to hack.

Satyajit (Admins,a.k.a Satosys) said...

@all Thanks.. :)Keep visiting.

Pubudu @ TechHamlet on November 19, 2010 at 9:25 PM said...

Cool post mate! I also need to do some hacking :P

Satyajit (Admins,a.k.a Satosys) said...

@Pubudu hey thanks for ur comment...yeah do try your hand on it.. :)

oyun oyna on November 30, 2010 at 3:54 PM said...


Kartik@DailyTechPost on December 1, 2010 at 11:26 AM said...

Hacking seems to be cool...I think every blogger must know little bit of hacking as it can be handy while securing your blog/site. Thanks for sharing this tool, I will be looking forward to more cool articles from you :)

Anonymous said...

REALLY good post , all the explaining and stuff, but i dont really understand , a real noob here . hope u can explain in a much easier way for a noob , i have no background in this stuff , but really interested in this area .
hope u reply soon , thanks

Anonymous said...

Awesome post!! I love the msf! !

Post a Comment

This blog is "DoFollow",Use a "Real Name" rather than using "Keywords" otherwise comment will be rejected.

Delete this element to display blogger navbar

© 2013 SecurityHunk All Rights Reserved and Template by Fresh Blogger Templates