Futaba _ Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Metasploit πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Today I’m going to talk about the metasploit framework, what it is, and why it’s a STAPLE tool in EVERY hacker's arsenal, whether it be for beginners or experienced hackers.

I’ve gone over how to use it for certain exploits, but I’ve never fully shown: how to set it up, what all the options mean, advanced options, how to chain and combine stuff, etc. I’m going to show you the most practical way to use the framework so that you can effortlessly hack it like a pro in no time.

πŸŽƒ Article πŸŽƒ Glossary πŸŽƒ Catalog πŸŽƒ Home πŸŽƒ Search Mode

πŸŽƒ Article Glossary

πŸ•Έ Synopsis πŸ•Έ

Today I’m going to talk about the metasploit framework, what it is, and why it’s a STAPLE tool in EVERY hacker's arsenal, whether it be for beginners or experienced hackers.

Disclaimer

As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, let's begin!

πŸ•Έ Article Topics πŸ•Έ

I'll be discussing the following topics in order:

πŸŽƒ Premise

πŸŽƒ What is Metasploit?

πŸŽƒ Auxiliary Mode

πŸŽƒ Exploit Mode

πŸŽƒ Payloads

You can click on any of the topics to simply check that one out if it interests you!

NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!

πŸ•Έ Key Links πŸ•Έ

Here's a quick run down on all the main links that are in the article in case you want to check them out first.

πŸŽƒ LinkedIn Version

πŸŽƒ Patreon Version

πŸŽƒ Metasploit

Premise πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

I’ve gone over how to use it for certain exploits, but I’ve never fully shown: how to set it up, what all the options mean, advanced options, how to chain and combine stuff, etc. I’m going to show you the most practical way to use the framework so that you can effortlessly hack it like a pro in no time.

I’m also going to show you one CRITICAL thing that commonly gets overlooked when using the framework. It’s an abundance of FREE knowledge, one that if you know how to use it, you’ll become one of the most skilled and dangerous hackers of all time. Think of the Metasploit as all your β€œpast lives”. You have access to all of that information. You just need to learn how to use it properly.

This article will of course be video oriented, and will only be available to PAID patreon members only.

It’s no shocker that it’s a staple tool in every hacker’s tool belt, but shockingly enough, due to how times have changed, I don’t quite see it picked up by newcomers or talked about enough anymore. I know it still sees light and people use it, but nowadays I rarely hear anyone post or even talk about it, and it’s one of the standard tools much like aircrack-ng. People forget that a lot of newer tools are based on the original ones that are known and loved by the hacker community.

Recently one of my favorite authors ran into an issue where someone thought recommending Aircrack-NG was a horrible idea due to how old it is, when it is in face one of THE best pentesting tools hands down to seamlessly crack various wireless encryption: WEP, WPA, WPA2, etc. Even most pentesting methodologies or tools mimic it in some shape or format just like with metasploit.

What is Metasploit? πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Metasploit is an offensive security penetration testing framework that can be used for a variety of penetration testing methodologies: web application, networking, C&C/botneting, mobile hacking, etc. It’s a multi-tool power house in case you haven’t noticed, and has left a legacy, where tools like SET, routersploit and even kali nethunter mimic in terms of overall terminal functional and design. It also has one of the best well maintained database archives of any and all exploits that exist in its database. The code written and stored in it is beyond our deserving.

Metasploit is also both an easy to use tool for beginners as well as a complex tool for more advanced folks in the hacking community, one that can require a bit of skill to use effectively. It’s also one of THE most maintained tools that you could ever pick up, as most tools, even if they’re super good and practical, lack support and maintenance, EVEN, if they happen to surpass it overall in functionality. It helps even more as most of the stuff is already there so no need to reinvent the wheel, just build on top of it, which many have like I’ve said before.

I’m going to talk about some of the opinions that you’ll see in the framework and what they mean as it can be quite confusing.




Auxiliary Mode πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

If you’ve noticed in my hacking with Shodan exploit guide, you’ll notice that when I use the shodan module, in the module address in the metasploit framework, the first part of the address begins with β€œauxiliary”, which indicates that that the module you are using is a form of information gathering tool.

You can use various auxiliary tools in metasploit for various purposes: port scanning, OSNIT, etc.


Exploit Mode πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

One of the most commonly well known module formats in metasploit, the exploit module, is basically an auto pwn exploit, where you simply need to pass in the coordinates, or configuration: IP, port, any word lists depending on the module, etc, and the tool set will do ti’s thing.

For example, for setting up reverse TCP shells, you have the classic exploit/multi-handler module which allows you to set up a multi purpose server that can be set to work with: linux, mac, and windows payloads, and auto pwn the system should you get the executable up and running on it.


Payloads πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Payloads are an interesting feature, as MANY don’t quite understand how to use them properly.

Payloads are basically the malicious code or executable that you’d often have to use mfvenom for in order to generate them, along with setting them inside exploit modules like with hacking mobile devices to get them up and running.

They are standalone and need to be delivered to the target in order for them to work. How you go about that is all up to you.

Next, I’m also going to also go over some other stuff you ONLY do with the msfvenom feature that is a part of the metasploit framework: encoders, evasion, etc.


portfolio img

If you like to see the more advanced version of this article that talks about methods that can be used to mitigate, as well as any videos included, SUBSCRIBE TO MY PATREON CYBER SECURITY TIER!

If you enjoyed this post give it a thumbs up! I’ll be keeping track of whose reacting from now on as there is a β€œspecial” reason for it. Just know the more you support my content the more there is in stored!


- The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

portfolio img

πŸŽƒ CONTACT ME

AnOnYmOuS

futaba.webs@gmail.com

New York, NY United States