Saturday, February 4, 2012

Penetration Testing with Metasploit Framework


When i say "Penetration Testing tool" the first thing that comes to your mind is the world's largest Ruby project, with over 700,000 lines of code 'Metasploit'. No wonder it had become the de-facto standard for penetration testing and vulnerability development with more than one million unique downloads per year and the world’s largest, public database of quality assured exploits.

The Metasploit Framework is a program and sub-project developed by Metasploit LLC. It was initially created in 2003 in the Perl programming language, but was later completely re-written in the Ruby Programming Language. With the most recent release (3.7.1) Metasploit has taken exploit testing and simulation to a complete new level which has muscled out its high priced commercial counterparts by increasing the speed and lethality of code of exploit in shortest possible time.

Metasploit Framework follows some key steps for exploiting a system that include -
1. The Select and configure the exploit to be targeted. This is the code that will be targeted toward a system with the intention of taking advantage of a defect in the software.
2. Validate whether the chosen system is susceptible to the chosen exploit.
3. Select and configures a payload that will be used. This payload represents the code that will be run on a system after a loop-hole has been found in the system and an entry point is set.
4. Select and configure the encoding schema to be used to make sure that the payload can evade Intrusion Detection Systems with ease.
5. Execute the exploit.

In this article we will give a detailed description on usage of Metasploit Framework to execute exploits with graphical illustrations and commands.

0 komentar:

Post a Comment