Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

Metasploit: NeXpose via MSFconsole

Advanced Ethical Hacking Institute in Pune
NeXpose vulnerability scanning in Metasploit
The Metasploit/NeXpose integration is not limited to simply importing scan results files. You can run NeXpose scans directly from msfconsole by first making use of the ‘nexpose‘ plugin.

 
msf > load nexpose
[…]

By |June 28th, 2015|Metasploit|

Metasploit: Working with NeXpose

Advanced Ethical Hacking Institute in Pune
Using NeXpose results within the Metasploit Framework
With the acquisition of Metasploit by Rapid7 back in 2009, there is now excellent compatibility between Metasploit and theNeXpose Vulnerability Scanner. Rapid7 has a community edition of their scanner that is available athttp://www.rapid7.com/vulnerability-scanner.jsp.

After we have installed and updated NeXpose, we run a full credentialed scan […]

By |June 28th, 2015|Metasploit|

Metasploit: WMAP Web Scanner

Advanced Ethical Hacking Institute in Pune
What is WMAP?
WMAP is a feature-rich web application vulnerability scanner that was originally created from a tool named SQLMap. This tool is integrated with Metasploit and allows us to conduct web application scanning from within the Metasploit Framework.
Vulnerability Scanning with WMAP
We begin by first creating a new database to store our […]

By |June 28th, 2015|Metasploit|

Metasploit: Vulnerability Scanning with Metasploit

Advanced Ethical Hacking Institute in Pune
Discovery through Vulnerability Scanning
Vulnerability scanning will allow you to quickly scan a target IP range looking for known vulnerabilities, giving a penetration tester a quick idea of what attacks might be worth conducting.

When used properly, this is a great asset to a pen tester, yet it is not without it’s draw […]

By |June 28th, 2015|Metasploit|

Metasploit: Writing Your Own Security Scanner

Advanced Ethical Hacking Institute in Pune
Using your own Metasploit Auxiliary Module
There are times where you may need a specific network security scanner, or having scan activity conducted withinMetasploit would be easier for scripting purposes than using an external program. Metasploit has a lot of features that can come in handy for this purpose, like access to all […]

By |June 28th, 2015|Metasploit|

Metasploit: SNMP Sweeping

Advanced Ethical Hacking Institute in Pune
SNMP Auxiliary Module for Metasploit
Continuing with our information gathering, lets take a look at SNMP Sweeping. SNMP sweeps are often a good indicator in finding a ton of information about a specific system or actually compromising the remote device. If you can find a Cisco device running a private string for example, […]

By |June 28th, 2015|Metasploit|

Metasploit: Password Sniffing

Advanced Ethical Hacking Institute in Pune
Password Sniffing with Metasploit
Max Moser released a Metasploit password sniffing module named ‘psnuffle‘ that will sniff passwords off the wire similar to the tool dsniff.

Using the psnuffle module is extremely simple. There are some options available but the module works great “out of the box”.

 
msf > use auxiliary/sniffer/psnuffle
msf auxiliary(psnuffle) > show […]

By |June 28th, 2015|Metasploit|

Metasploit: Service Identification

Advanced Ethical Hacking Institute in Pune
Scanning Services using Metasploit
Again, other than using Nmap to perform scanning for services on our target network, Metasploit also includes a large variety of scanners for various services, often helping you determine potentially vulnerable running services on target machines.

Contents

1 SSH Service
2 FTP Service

SSH Service
A previous scan shows us we have TCP port […]

By |June 28th, 2015|Metasploit|

Metasploit: Hunting for MSSQL

Advanced Ethical Hacking Institute in Pune
Using Metasploit to find MSSQL vulnerable systems
Searching and locating MSSQL installations inside the internal network can be achieved using UDP foot-printing. When MSSQL installs, it installs either on port 1433 TCP or a randomized dynamic TCP port. If the port is dynamically attributed, querying UDP port 1434 will provide us with […]

By |June 28th, 2015|Metasploit|

Metasploit: Information Gathering in Metasploit

Advanced Ethical Hacking Institute in Pune
Information gathering with Metasploit
The foundation for any successful penetration test is solid reconnaissance. Failure to perform proper information gathering will have you flailing around at random, attacking machines that are not vulnerable and missing others that are.

We’ll be covering just a few of these information gathering techniques such as:

Port Scanning
Hunting for […]

By |June 28th, 2015|Metasploit|