Meterpreter
From charlesreid1
Contents
What Is It?
Meterpreter is a payload delivered to a target machine that communicates over a network using sockets. It's essentially an enhanced shell, and the client-side payload provides a Ruby API that enables it to be controlled with Metasploit.
Meteterpret Scripts
More details described here: https://www.offensive-security.com/metasploit-unleashed/meterpreter-basics/
Keylogging features described here: https://www.offensive-security.com/metasploit-unleashed/Keylogging/
Also: http://think-security.com/using-meterpreter-for-remote-keystroke-sniffing/
but I'm having trouble with some of that.
Hash dumping: https://community.rapid7.com/community/metasploit/blog/2010/01/01/safe-reliable-hash-dumping
Some built-in scripts: https://www.offensive-security.com/metasploit-unleashed/existing-scripts/
How to use, from wikibooks: https://en.wikibooks.org/wiki/Metasploit/MeterpreterClient
Stealing Memory with MDD
http://wiki.securityweekly.com/wiki/index.php/Episode142
Why Meterpreter is Better
Meterpreter is an entirely in-memory tool, and writes nothing to disk.
It uses encrypted communications - so replaces cryptcat.
It provides additional functionality that a basic netcat or cryptcat shell might not provide.
How To Use
Some commands and info here: https://en.wikibooks.org/wiki/Metasploit/MeterpreterClient
Flags
Metasploit any and all resources related to metasploit on this wiki
Category:Metasploit - pages labeled with the "Metasploit" category label MSF/Wordlists - wordlists that come bundled with Metasploit MSFVenom - msfvenom is used to craft payloads Meterpreter - the shell you'll have when you use MSF to craft a remote shell payload.
Category:Security · Category:Metasploit · Category:Kali
|
Metasploitable: The Red Team Metasploitable is a virtual machine with baked-in vulnerabilities, designed to teach Metasploit. This set of articles discusses the RED TEAM's tools and routes of attack.
Exploiting MySQL with Metasploit: Metasploitable/MySQL Exploiting PostgreSQL with Metasploit: Metasploitable/Postgres
Exploiting VSFTP Backdoor: Metasploitable/VSFTP SSH Penetration by Brute Force: Metasploitable/SSH/Brute Force SSH Penetration with Keys: Metasploitable/SSH/Keys SSH Penetration with Metasploit: Metasploitable/SSH/Exploits Brute-Forcing Exploiting NFS: Metasploitable/NFS Exploiting DNS Bind Server: Metasploitable/DNS Bind
Metasploitable Services: distcc: Metasploitable/distcc
Metasploitable Apache: Exploiting Apache (with Metasploit): Metasploitable/Apache Exploiting Apache (with Python): Metasploitable/Apache/Python Tor's Hammer DoS Attack: Metasploitable/TorsHammer * Apache DAV: Metasploitable/Apache/DAV * Apache Tomcat and Coyote: Metasploitable/Apache/Tomcat and Coyote
Metasploitable Memory: General approach to memory-based attacks: Metasploitable/Memory Investigating memory data: Metasploitable/Volatile Data Investigation Dumping Memory from Metasploit: Metasploitable/Dumping Memory
Metasploitable Fuzzing: (Have not done much work on fuzzing Metasploitable...)
Category:Security · Category:Metasploit · Category:Metasploitable · Category:Kali
|
Metasploitablue: The Blue Team Metasploitable is a virtual machine with baked-in vulnerabilities, designed to teach Metasploit. This set of articles discusses the BLUE TEAM's methods for defending Metasploitable: defending against and responding to intrusions.
Hence the name, Metasploita-blue. Overview: Metasploitable/Defenses Metasploitable/Defenses/Stopping · Metasploitable/Defenses/Detecting
Metasploitable On-Machine Defenses: Linux Volatile Data System Investigation: Metasploitable/Volatile Data Investigation Linux Artifact Investigation: Metasploitable/Artifact Investigation Linux Iptables Essentials: Metasploitable/Iptables Firewall Assurance and Testing: Metasploitable/Firewall Password Assessment: Metasploitable/Password Assessment Standard Unix Ports: Unix/Ports
Netcat and Cryptcat (Blue Team): Metasploitable/Netcat and Metasploitable/Cryptcat Nmap (Blue Team): Metasploitable/Nmap Network Traffic Analysis: Metasploitable/Network Traffic Analysis Suspicious Traffic Patterns: Metasploitable/Suspicious Traffic Patterns Snort IDS: Metasploitable/Snort
|