Top Metasploit Framework Commands Scan Vulnerabilities

One such penetration testing aid is the Metasploit Project. This Ruby-based open-source framework allows testing via command line alterations or GUI. It can also be extended through coding to act as an add-on that supports multiple languages.  

Also See: [FREE] Learn Ethical Hacking From Scratch

Metasploit Framework Commands

What is metasploit and how to use it?

The Metasploit framework is a very powerful tool which can be used by cybercriminals as well as ethical hackers to probe systematic vulnerabilities on networks and servers. Because it’s an open-source framework, it can be easily customized and used with most operating systems.   With Metasploit, the pen testing team can use ready-made or custom code and introduce it into a network to probe for weak spots. As another flavor of threat hunting, once flaws are identified and documented, the information can be used to address systemic weaknesses and prioritize solutions.

Also See: [FREE] Learn Network Hacking From Scratch (WiFi & Wired)

Also See: Free Premium Chegg Accounts & Passwords 2020

How to Use Metasploit: Tutorial + Tips

The ease of learning to use Metasploit depends on your knowledge of Ruby. However, if you have a familiarity with other scripting and programming languages like Python, making the jump to working with Metasploit shouldn’t be too difficult to get up to speed. Otherwise, it’s an intuitive language that’s easy to learn with practice.

Because this tool requires you to disable your own systematic protections and enables the generation of malicious code, you should be aware of the potential risks involved. If possible, keep this utility installed on a separate system than your personal device or any computer that contains potentially sensitive information or access to such information. You should use a dedicated work device when pen-testing with Metasploit.

Also See: ESET FREE LINCENSE KEYS UPDATED 2020

How to download Metasploit

Downloading metasploit for windows,metasploit for android,metasploit for mac,metasploit for ubuntu. Metasploit ships as part of Kali Linux, but you can also download it separately at the Metasploit website. Metasploit runs on *nix and Windows systems. The Metasploit Framework source code is available on GitHub.   Like Coca-Cola, Metasploit comes in different flavors. In addition to the free/libre Metasploit Framework, Rapid7 also produces the Metasploit Community Edition, a free web-based user interface for Metasploit, and Metasploit Pro, the big daddy with the non-free add-ons for pentesters who prefer a GUI or MS Office-like wizards to perform baseline audits, and want to phish their clients as part of an engagement. Rapid7 offers a feature comparison on its website.  

LINKS :

Metasploit How to scan for vulnerabilities

Vulnerability scanning will allow you to quickly scan a target IP range looking for known vulnerabilities, giving a penetration tester a quick idea of what attacks might be worth conducting.   When used properly, this is a great asset to a pen tester, yet it is not without it’s draw backs. Vulnerability scanning is well known for a high false positive and false negative rate. This has to be kept in mind when working with any vulnerability scanning software.   Lets look through some of the vulnerability scanning capabilities that the Metasploit Framework can provide.  

GITHUB METASPLOIThttps://github.com/rapid7/metasploit-framework

Also See: FREE CHEGG ACCOUNT

Metasploit Framework Scripts and Exploits

  • arp_scanner.rb – Script for performing an ARP’s Scan Discovery.
  • autoroute.rb – Meterpreter session without having to background the current session.
  • checkvm.rb – Script for detecting if target host is a virtual machine.
  • credcollect.rb – Script to harvest credentials found on the host and store them in the database.
  • domain_list_gen.rb – Script for extracting domain admin account list for use.
  • dumplinks.rb – Dumplinks parses .lnk files from a user’s recent documents folder and Microsoft Office’s Recent documents folder, if present. The .lnk files contain time stamps, file locations, including share names, volume serial #s and more. This info may help you target additional systems.
  • duplicate.rb – Uses a meterpreter session to spawn a new meterpreter session in a different process. A new process allows the session to take risky actions that might get the process killed by A/V, giving a meterpreter session to another controller, or start a keylogger on another process.
  • enum_chrome.rb – Script to extract data from a chrome installation.
  • enum_firefox.rb – Script for extracting data from Firefox. 
  • enum_logged_on_users.rb – Script for enumerating current logged users and users that have logged in to the system. enum_powershell_env.rb – Enumerates PowerShell and WSH configurations.
  • enum_putty.rb – Enumerates Putty connections.
  • enum_shares.rb – Script for Enumerating shares offered and history of mounted shares.
  • enum_vmware.rb – Enumerates VMware configurations for VMware products.
  • event_manager.rb – Show information about Event Logs on the target system and their configuration.
  • file_collector.rb – Script for searching and downloading files that match a specific pattern.
  • get_application_list.rb – Script for extracting a list of installed applications and their version.
  • getcountermeasure.rb – Script for detecting AV, HIPS, Third Party Firewalls, DEP Configuration and Windows Firewall configuration. Provides also the option to kill the processes of detected products and disable the built-in firewall.
  • get_env.rb – Script for extracting a list of all System and User environment variables.
  • getfilezillacreds.rb – Script for extracting servers and credentials from Filezilla.
  • getgui.rb – Script to enable Windows RDP.
  • get_local_subnets.rb – Get a list of local subnets based on the host’s routes.
  • get_pidgen_creds.rb – Script for extracting configured services with username and passwords.
  • gettelnet.rb – Checks to see whether telnet is installed.
  • get_valid_community.rb – Gets a valid community string from SNMP.
  • getvncpw.rb – Gets the VNC password.
  • hashdump.rb – Grabs password hashes from the SAM.
  • hostedit.rb – Script for adding entries in to the Windows Hosts file.
  • keylogrecorder.rb – Script for running keylogger and saving all the keystrokes.
  • killav.rb – Terminates nearly every antivirus software on victim.
  • metsvc.rb – Delete one meterpreter service and start another.
  • migrate – Moves the meterpreter service to another process.
  • multicommand.rb – Script for running multiple commands on Windows 2003, Windows Vistaand Windows XP and Windows 2008 targets.
  • multi_console_command.rb – Script for running multiple console commands on a meterpreter session.
  • multi_meter_inject.rb – Script for injecting a reverce tcp Meterpreter Payload into memory of multiple PIDs, if none is provided a notepad process will be created and a Meterpreter Payload will be injected in to each.
  • multiscript.rb – Script for running multiple scripts on a Meterpreter session.
  • netenum.rb – Script for ping sweeps on Windows 2003, Windows Vista, Windows 2008 and Windows XP targets using native Windows commands.
  • packetrecorder.rb – Script for capturing packets in to a PCAP file.
  • panda2007pavsrv51.rb – This module exploits a privilege escalation vulnerability in Panda Antivirus 2007. Due to insecure permission issues, a local attacker can gain elevated privileges.
  • persistence.rb – Script for creating a persistent backdoor on a target host.
  • pml_driver_config.rb – Exploits a privilege escalation vulnerability in Hewlett-Packard’s PML Driver HPZ12. Due to an insecure SERVICE_CHANGE_CONFIG DACL permission, a local attacker can gain elevated privileges.
  • powerdump.rb – Meterpreter script for utilizing purely PowerShell to extract username and password hashes through registry keys. This script requires you to be running as system in order to work properly. This has currently been tested on Server 2008 and Windows 7, which installs PowerShell by default.
  • prefetchtool.rb – Script for extracting information from windows prefetch folder.
  • process_memdump.rb – Script is based on the paper Neurosurgery With Meterpreter.
  • remotewinenum.rb – This script will enumerate windows hosts in the target environment given a username and password or using the credential under which Meterpeter is running using WMI wmic windows native tool.
  • scheduleme.rb – Script for automating the most common scheduling tasks during a pentest. This script works with Windows XP, Windows 2003, Windows Vista and Windows 2008.
  • schelevator.rb – Exploit for Windows Vista/7/2008 Task Scheduler 2.0 Privilege Escalation. This script exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet.
  • schtasksabuse.rb – Meterpreter script for abusing the scheduler service in Windows by scheduling and running a list of command against one or more targets. Using schtasks command to run them as system. This script works with Windows XP, Windows 2003, Windows Vista and Windows 2008.
  • scraper.rb – The goal of this script is to obtain system information from a victim through an existing Meterpreter session.
  • screenspy.rb – This script will open an interactive view of remote hosts. You will need Firefox installed on your machine.
  • screen_unlock.rb – Script to unlock a windows screen. Needs system privileges to run and known signatures for the target system.
  • screen_dwld.rb – Script that recursively search and download files matching a given pattern.
  • service_manager.rb – Script for managing Windows services.
  • service_permissions_escalate.rb – This script attempts to create a service, then searches through a list of existing services to look for insecure file or configuration permissions that will let it replace the executable with a payload. It will then attempt to restart the replaced service to run the payload. If that fails, the next time the service is started (such as on reboot) the attacker will gain elevated privileges.
  • sound_recorder.rb – Script for recording in intervals the sound capture by a target host microphone.
  • srt_webdrive_priv.rb – Exploits a privilege escalation vulnerability in South River Technologies WebDrive.
  • uploadexec.rb – Script to upload executable file to host.
  • virtualbox_sysenter_dos – Script to DoS Virtual Box.
  • virusscan_bypass.rb – Script that kills Mcafee VirusScan Enterprise v8.7.0i+ processes.
  • vnc.rb – Meterpreter script for obtaining a quick VNC session.
  • webcam.rb – Script to enable and capture images from the host webcam.
  • win32-sshclient.rb – Script to deploy & run the plink command line ssh-client. Supports only MS-Windows-2k/XP/Vista Hosts.
  • win32-sshserver.rb – Script to deploy and run OpenSSH on the target machine.
  • winbf.rb – Function for checking the password policy of current system. This policy may resemble the policy of other servers in the target environment.
  • winenum.rb – Enumerates Windows system including environment variables, network interfaces, routing, user accounts, etc
  • wmic.rb – Script for running WMIC commands on Windows 2003, Windows Vista and Windows XP and Windows 2008 targets.

Leave a Comment