Metasploit Express User Guide
Total Page:16
File Type:pdf, Size:1020Kb
Metasploit Express User Guide Metasploit Express User Guide Release 3.6 March 7, 2011 Table of Contents About Metasploit Express.......................................................................................................... 5 Metasploit Express Components Overview ......................................................................... 5 Metasploit Express Service Listeners ................................................................................. 6 About This Guide ........................................................................................................................ 7 Target Audience ................................................................................................................ 7 Organization ...................................................................................................................... 7 Document Conventions ...................................................................................................... 7 Support ............................................................................................................................. 8 Metasploit Express Interface Tour............................................................................................ 9 Navigational Tour............................................................................................................... 9 Projects Page Tour ...........................................................................................................10 Overview Page Tour .........................................................................................................10 Hosts Page Tour ...............................................................................................................11 Sessions Page Tour..........................................................................................................12 Modules Page Tour ..........................................................................................................13 Reports Page Tour ...........................................................................................................14 Task Page Tour ................................................................................................................15 Getting Started with Metasploit Express ............................................................................... 17 Installing Metasploit Express .............................................................................................17 System Requirements................................................................................................ 17 Operating Systems .................................................................................................... 17 Creating a User Account ...................................................................................................17 Registering the Product .....................................................................................................19 Running Metasploit Express ..............................................................................................19 Launching Metasploit Express in Windows ................................................................. 19 Launching Metasploit Express in Linux ....................................................................... 19 Setting Up a Target (Metasploit Vulnerable VMs) ...............................................................20 System Requirements for Host and Guest Systems .................................................... 21 Obtaining the Vulnerable VM...................................................................................... 22 Setting Up the Vulnerable VM .................................................................................... 22 Common Vulnerabilities and Exposures (CVE) ..................................................................22 Module Browser ........................................................................................................ 22 Host Vulnerabilities .................................................................................................... 22 Reporting .................................................................................................................. 22 About CVE ................................................................................................................ 23 Error Recovery .................................................................................................................23 Metasploit E x p r e s s User Guide 3. 6 Page 2 Administration ........................................................................................................................... 24 User Accounts ..................................................................................................................24 Editing a User Account .............................................................................................. 24 Changing the Password for Your User Account ........................................................... 24 Updating License Keys .....................................................................................................25 Updating Metasploit Express .............................................................................................25 Maintaining Metasploit Express .........................................................................................26 Uninstalling Metasploit Express .........................................................................................26 Linux (RHEL / Ubuntu) ............................................................................................... 26 Windows ................................................................................................................... 27 Metasploit Express Tasks ........................................................................................................ 28 Metasploit Express Workflow.............................................................................................28 Working with Projects .......................................................................................................28 Creating a Project ...................................................................................................... 29 Editing Projects ......................................................................................................... 29 Viewing All Projects ................................................................................................... 30 Setting Network Boundaries ....................................................................................... 30 Discovering Hosts .............................................................................................................30 Discovering Hosts with a Scan ................................................................................... 31 Discovering Hosts with NeXpose ................................................................................ 32 Importing Scan Data .................................................................................................. 34 Manually Adding Hosts .............................................................................................. 34 Host Comments ......................................................................................................... 35 Gaining Access to Hosts ...................................................................................................36 Automated Exploitation .............................................................................................. 36 Bruteforcing Hosts ..................................................................................................... 39 Importing Credentials for Bruteforce ........................................................................... 42 Manual Exploitation ................................................................................................... 44 Running Post-Exploitation Modules ............................................................................ 45 Interpreting Host Badges ........................................................................................... 45 Taking Control of Sessions................................................................................................46 Command Shell Vs. Meterpreter Sessions ................................................................. 47 Interacting with Command Shell Sessions .................................................................. 47 Interacting with Meterpreter Sessions ......................................................................... 48 Viewing Session Details ............................................................................................. 48 Obtaining VNC Sessions ............................................................................................ 48 Accessing a Filesystem.............................................................................................. 49 Uploading Files to a Remote Filesystem ..................................................................... 50 Searching a Filesystem .............................................................................................. 50 Collecting Evidence and Session Cleanup .........................................................................51 Collecting Evidence for a Project ...............................................................................