logo

Metasploit Framework: Features, Techniques, and Experiment

   

Added on  2023-03-20

9 Pages1857 Words31 Views
METASPLOIT
Introduction
Metasploit framework was created in 2003 by H.D Moore. It’s an open source framework and
can be used by anyone. The best thing about Metasploit is that it is a framework, and anyone can
build their own tools to use for a specific function. There are three types of Metasploit
frameworks. Metasploit Pro, Metasploit Community and Metasploit framework. Metasploit
community and framework are open source and are available for free while Metasploit Pro you
must pay to fully access it after the 14-day trial period. Metasploit is used to run attacks on other
systems and to exploit the vulnerability of systems and hack into them. Mostly it is used by
hackers to test the strength of a system (Dalziel, 2019). The Metasploit framework has two types
of interfaces: the console interface and the GUI interface. Both these interfaces can perform the
same tasks and it depends on the user preference. Metasploit framework can be used in windows
environment, Linux environment and Mac OS environment. You can find the downloadable files
on their website. For kali Linux, the Metasploit framework comes already installed. In this report
we are going to concentrate on the kali Linux Metasploit framework.
Features of Metasploit Framework
Metasploit has various features that assist the user in finding vulnerabilities to the system. Some
of the features of Metasploit framework include
The Meterpreter
This is a payload which contains various functions which can change and can also be increased
when a system is ran. This feature gives you an interface which is a basic shell and gives you
access to increase the features and possibly make new ones.
PassiveX Payloads
This feature targets the ActiveX controls. It manipulates the registry of the targeted system and
this in turn causes the processes that have been compromised to launch Internet explores with a
URL that points back to the framework. A web server is started by the framework and the
request is then acknowledged which in turn starts a web page which loads the Active x control
that has been exploited. The compromised component then registers, downloads and executes the
ActiveX.
Metasploit Framework: Features, Techniques, and Experiment_1
Chainable Proxies
This feature makes use of the TCP proxies. Before an exploit can be carried out using this
feature, an environment variable must be set up first. After that the server is configured using the
host and port format. This server can be used to test whether a system is secure or not. You can
use multiple server configuration until you find the system weakness.
Win32 UploadExec Payloads
This feature exploits the weaknesses that are in the windows operating system. It takes advantage
of the fact that windows does not have a powerful command line. This feature enables users to
exploit a Windows system. It is very powerful in that it can allow the hacker to upload and
execute the tool they are used to wit ease across the payload socket connection. Also, it can be
used with other scripting languages such as perl.exe or combined with a self-extracting rootkit
hence making it one of the features that’s powerful in Metasploit.
Win32 DLL Injection Payloads
This feature enables a hacker to customize their own DLL and use it to exploit other systems.
The DLL is inserted to the memory of the target system and is usually combined with a Win32
exploit. When this is done the DLL will export a function known as init which will now be the
access point to which the processes can be exploited by the new thread.
VNC Server DLL Injection
This feature allows the hacker to gain access to the other systems desktop by using the win32
exploit. Once the DLL is inserted into one of the processes of the target system, it is started as a
new thread. Once the thread has been started, it listens to the requests made by the VNC client.
The framework then gathers information that is sent through the VNC client and after acquiring
all the needed information, it will attempt to gain full access to the target computers desktop.
Techniques used by Metasploit to exploit vulnerabilities of information systems
Exploits that are used in the Metasploit framework have been categorized into two. Active
exploits and passive exploits. Active exploits will compromise a particular target and exploit the
target until the process is completed then it terminates the process. On the other hand, A passive
exploit will wait until the hosts are identified then compromise them as they connect
(Kerner,2019).
Some of the techniques used include
Metasploit Framework: Features, Techniques, and Experiment_2
Information gathering
For a hack to be successful adequate information needs to be gathered for that system to
adequately understand the system. There are various types of methods for gathering information
and these methods include
a) Port scanning. This gathers information on a network through the ports. Port scanning
can either be done on the whole network or just a particular target. It is effective
especially when some systems are behind s firewall.
b) Hunting for MSSQL. Installations of MSSQL nature are targeted using this information
gathering technique. This can be achieved by the use of UDP foot printing.
c) Service Identification Metasploit also includes a large variety of scanners for various
services, often helping you determine potentially vulnerable running services
d) Password Sniffing, The Metasploit framework has a variety of password sniffing tools
which can be used to acquire the passwords of different users. An example of a password
sniffing tool is the dsniff. This tool supports various protocols such as IMAP
e) SNMP sweeping. This includes sweeping of different systems so as to acquire more
information about them. An example is finding a cisco device and downloading its
configurations. After that is done, the hacker can replace the configuration by replacing it
with his own malicious configuration and uploading it to that device
Vulnerability Scanning with Metasploit
This involves scanning and identifying a vulnerable system before exploiting it. The scanning is
based on a certain range of IP addresses and this helps the attacker to identify which type of
attack to use (Maynor, 2011). This method has its advantages and disadvantages, but the results
obtained are often high when using this method.
a) SMB login check. This method connects to different targets and identifies whether different
combinations of password and usernames can compromise the targets.
b) VNC Authentication. This tool scans a given IP address range and tries to locate systems har
are running VNC server. If it finds a VNC server, it will check if it has a password that has
been configured to it or not. If the password has not been configured, it makes it easy for the
hacker to gain access to the system.
Metasploit Framework: Features, Techniques, and Experiment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Metasploit Framework Assignment PDF
|26
|1193
|325

INFORMATION SYSTEM THREATS, ATTACKS AND DEFENSES.
|29
|1680
|33

Kali Linux System for Penetration Testing and Network Security Assessment
|14
|1647
|162

This vulnerability allows the attackers
|21
|1135
|15

Computer Network Security | Assignment
|36
|3876
|11

EternalBlue Exploit: Demonstration and Risk Assessment
|15
|2257
|268