Assignment 3 - Ethical Hacking Tool-Metaspoilt 1
Assignment 3 - Ethical Hacking Tool-Metaspoilt 1
With cybercrime at an all-time high, it is more important than ever to learn how to
use security in the business world. Penetration testing allows businesses to evaluate
the overall security of their IT infrastructure. Metasploit is one of the best
penetration testing frameworks that help a business find out and shore up
vulnerabilities in their systems before exploitation by hackers. To put it simply,
Metasploit allows hacking with permission.
The various tools, libraries, user interfaces, and modules of Metasploit allow a user
to configure an exploit module, pair with a payload, point at a target, and launch at
the target system. Metasploit’s large and extensive database houses hundreds of
exploits and several payload options.
A Metasploit penetration test begins with the information gathering phase, wherein
Matsploit integrates with various reconnaissance tools like Nmap, SNMP scanning,
and Windows patch enumeration, and Nessus to find the vulnerable spot in your
system. Once the weakness is identified, choose an exploit and payload to
penetrate the chink in the armor. If the exploit is successful, the payload gets
executed at the target, and the user gets a shell to interact with the payload. One of
the most popular payloads to attack Windows systems is Meterpreter – an in-
memory-only interactive shell. Once on the target machine, Metasploit offers
various exploitation tools for privilege escalation, packet sniffing, pass the hash,
keyloggers, screen capture, plus pivoting tools. Users can also set up a persistent
backdoor if the target machine gets rebooted.
The extensive features available in Metasploit are modular and extensible, making
it easy to configure as per every user requirement.
1. Auxiliaries
Auxiliaries are the modules that make Metasploit so easy to work with. A
Metasploit auxiliary is nothing but a specific piece of code written to
perform a particular task. For example, it can be used to check if we can
access an FTP server anonymously or to check if the webserver is
vulnerable to a heart bleed attack. In fact, Metasploit has more than
1,000 auxiliary modules that perform various tasks like scanning, fuzzing,
sniffing, and much more. These auxiliary modules are classified into 19
categories. Following are the categories of auxiliary modules that are
available in Metasploit :
2. Payloads
You have already learned in the above topic that an exploit is a piece of
code that will be used against the component that is vulnerable. The
exploit code may run successfully, but what do you want to do once the
exploit is successfully defined by the payload. In simple terms, a payload
can be defined as the action that needs to be performed after the
complete execution of an exploit. Metasploit has around 42 payloads that
can be classified into the following categories:
3. Exploits
Exploits are an extremely important part of Metasploit. The whole
purpose of the framework is to offer exploits that you can use for various
vulnerabilities. An exploit is a code that takes advantage of a software
vulnerability or security flaw and you will use this code on the target
system to take advantage of the vulnerabilities present in the target
system. Metasploit has more than 1,800 exploits that can be classified
into 17 categories. Following are the categories of exploits that are
available in Metasploit:
4. Encoders
Metasploit helps you in generating a wide variety of payloads that you
can send to the target in multiple ways to perform any task. In the
process, it is quite possible that your payload gets detected by any of the
security software present on the target system or antivirus software. This
is where encoders came into work. Encoders use various algorithms and
techniques to obscure the payload in a way that it doesn’t get detected
by antivirus software. Metasploit has about 40 encoders that can be
categorized into ten major categories, as shown here:
5. Post-Exploitation Activities (Post)
Once you have gained access to your target system using any of the
available exploits and here we are talking about basic access, you can
make use of the post modules to further infiltrate the target system.
These operations are mostly done in Cyber Events with complete
permissions and must be done in an Ethical way. With the help of these
modules you can perform the following Post-exploitation activities :
Escalating user privileges to administrator or root.
Retrieving the system credentials
Stealing cookies and saved credentials
Capturing keystrokes on the target system
Executing custom Power Shell scripts for performing
Additional tasks: Making the Access persistent
Metasploit has around 300 post-exploitation modules that can be
classified into the following 11 categories:
The various tools, libraries, user interfaces, and modules of Metasploit allow a user
to configure an exploit module, pair with a payload, point at a target, and launch at
the target system. Metasploit’s large and extensive database houses hundreds of
exploits and several payload options.
A Metasploit penetration test begins with the information gathering phase, wherein
Matsploit integrates with various reconnaissance tools like Nmap, SNMP scanning,
and Windows patch enumeration, and Nessus to find the vulnerable spot in your
system. Once the weakness is identified, choose an exploit and payload to
penetrate the chink in the armor. If the exploit is successful, the payload gets
executed at the target, and the user gets a shell to interact with the payload. One of
the most popular payloads to attack Windows systems is Meterpreter – an in-
memory-only interactive shell. Once on the target machine, Metasploit offers
various exploitation tools for privilege escalation, packet sniffing, pass the hash,
keyloggers, screen capture, plus pivoting tools. Users can also set up a persistent
backdoor if the target machine gets rebooted.
The extensive features available in Metasploit are modular and extensible, making
it easy to
With the wide range of applications and open-source availability that Metasploit
offers, the framework is used by professionals in development, security, and
operations to hackers. The framework is popular with hackers and easily available,
making it an easy to install, reliable tool for security professionals to be familiar with
even if they don’t need to use it.
Metasploit provides you with varied use cases, and its benefits include:
Easy Switching Between Payloads – the set payload command allows easy,
quick access to switch payloads. It becomes easy to change the
meterpreter or shell-based access into a specific operation.
Cleaner Exits – Metasploit allows a clean exit from the target system it has
compromised.