Binca Metasploit
Binca Metasploit
Binca Metasploit
Most popular exploitation framework and largest Ruby project. Having a hooked browser allows:
Commonly associated with network explotation but has useful limited system privileges
auxiliary modules for web app testing. low persistence
lacks the ability to exploit vulnerabilities
Uses modular approach for payloads an exploits allowing for flexib‐
wealth of knowledge about browsing environment
ility
Can configure BeEF to point at Metasploit RPC listener to expose
Auxiliary modules available for scanning, crawling/spidering and
Metasploit modules.
querying web servers; > 150 unique entries in auxiliary/scanner/http.
Enabling integration:
Especially useful for testing off-the-shelf applications including
1. Update config.yml in beef direoctry
WordPress, Joomla, Drupal, Oracle DB, SQL Server, SCADA
2. Configure Metasploit RPC in msfconsole by typing
frontends and more.
load msgrpc ServerHost=127.0.0.1
Pass = password
Seeding Metasploit
3. Update config.yml in extensions/metasploit directory with info
Metasploit has two spiders:
about Metasploit RPC
auxiliary/crawler/msfcrawler
4. Start BeEF
auxiliary/scanner/http/crawler
5. Inject Metasploit
But Metasploit's crawlers are not a replacement for ZAP or Burp and
instead Metasploit can import results from other tools. Sqlmap and Metasploit
db_import allows Metasploit to ingest the output files of certain 2-way integration: {{nl} Sqlmap.py can leverage a local Metasploit
tools, parsing them into its own database structure. install or use sqlmap module within Metasploit (less common)
db_import -h provides a list of supported files and formats, many Within Sqlmap, Metasploit is primarily used for shellcode (shell,
tools are included including Acunetix, AppScan, Burp, NetSparker, VNC, Meterpreter)
Nikto, and Wapiti. --os-pwn : leverage Metasploit
--priv-esc: Attempts privilege escalation on Windows
WMAP --msf-path: Defines local Metasploit install location
A web scanning plugin in Metasploit, last updated in 2012 but still
useful. Metasploit and Known Vulnerabilities
Interfaces with Metaspoit's backend database launching auxiliary and Main use in web apps is for known vulnerabilities
exploit modules related to the web apps results within the database. Custom application testing can be done with WMAP or auxiliary
Can create custom profiles to run using wmap_sample_profile.txt modules but exploitation is the main purpose.
as a template. Exploits against CMS, databases, specified SQLi Flaws, and major
Lack documentation. vulnerabilities such as ShellShock, Heartbleed, Drupalgeddon
One of the most common CMS serving content to end users and
providing functionality.
CMS are high-value targets because of their critical purpose.
Drupalgeddon (CVE-2014-3704) and patched on October 15, 2014
Flaw is an unauthenticated SQLi vulnerability present on all Drupal 7
installs.
Successful exploitation provides data access, remote code
execution and local privilege execution.
Widespread automated exploitation within hours.
Reason for the flaw lies within Drupal's use of prepared statements for
SQL queries meant to defend against SQLi.
Drupal includes expandArguments() that explodes the arrays but it
did not handle specially crafted input properly.
Compounded by Drupal's use of PHP Data Objects (PDO), which
employs emulated prepared statements allowing for multiple queries
as one request.
The result was unfiltered input was passed to expandArguments()
fnction allowing for an exploit entry point (SELECT pivot to INSERT)