+ All Categories
Home > Technology > Metasploit for information gathering

Metasploit for information gathering

Date post: 13-Dec-2014
Category:
Upload: chris-harrington
View: 94 times
Download: 0 times
Share this document with a friend
Description:
Usage guide on using Metasploit auxiliary modules for information gathering. Some modules are used as examples to show functionality. The need for cyber investigators are booming and the tools available to perform investigations already exist, in most circumstances. While the majority of tools are open source, paid applications exist as well.
17
Metasploit for information gathering Auxiliary modules For cybercrime investigations Usage guide Created by Chris Harrington
Transcript
Page 1: Metasploit for information gathering

Metasploit for information

gatheringAuxiliary modules

For cybercrime investigationsUsage guide

Created by Chris Harrington

Page 2: Metasploit for information gathering

There are several interfaces ◦ gui◦ console◦ web

Auxiliary modules are in 3 categories◦ Admin◦ Scanner◦ Server

General info

Page 3: Metasploit for information gathering

Using Kali Linux◦ Start Postgresql

Metasploit uses postgresql to speed up searching

/etc/init.d/postgresql start◦ Start metasploit

/etc/init.d/metasploit start

Starting up Metasploit

Page 4: Metasploit for information gathering

Run command: msfconsole

Inside Metasploit console

Starting Metasploit console

Page 5: Metasploit for information gathering

Ensure Metasploit is connected to the postgresql database◦ This speeds up search significantly

Command: db_status

Database check

Page 6: Metasploit for information gathering

Searching the auxiliary databaseCommand: search auxiliary

◦ All auxiliary modules are shown Filter search and search for mysql

Command: search mysql

More refined search only for auxiliary

Searching

Page 7: Metasploit for information gathering

Selecting module for information gathering

Results

Page 8: Metasploit for information gathering

Use the probe module

Command: use auxiliary/scanner/mysql/mysql_version

Show options that can be setCommand: show options

Using module

Page 9: Metasploit for information gathering

Required options must be set

Options

list of options that can be set using set commandcurrently assigned value to option

required or not required option to set

description of option

Page 10: Metasploit for information gathering

Set required parameters

Command: set <OPTION> <VALUE>

Set RPORT if default port is different Threads can be changed for multiple hosts

Set options

set command to set parameters

option to set called RHOSTS

host of suspect running mysql

Page 11: Metasploit for information gathering

Command: run

Suspect host running MySQL 5.1.73-community

Running auxiliary

Page 12: Metasploit for information gathering

Metasploit comes with several scanners◦ identifying open ports◦ Service identification◦ and more

Command: search auxiliary/scanner

Scanners

Page 13: Metasploit for information gathering

Use arp_sweep module to discovery other hosts on the same network

Command: use auxiliary/scanner/discovery/arp_sweep

Show options and set required values

Host discovery

Page 14: Metasploit for information gathering

Port scan Use tcp portscan module to identify open

ports on the suspect’s machine

Command: use auxiliary/scanner/portscan/tcp

Show options and set required values

Page 15: Metasploit for information gathering

Set RHOSTS and other options

Run the scan

Single host scan

Page 16: Metasploit for information gathering

Contains many tools and modules◦ Auxiliary◦ Exploits◦ Payloads

Easy to use and multiple interfaces Cost and time saving Remember to set OPTIONS appropriate to

your situation Other tools exist for port and service

identification Know what you are doing. Don’t get

compromised

Notes

Page 17: Metasploit for information gathering

My contact details

[email protected]

Questions?


Recommended