PENETRATION TESTING USING
METASPLOIT
Guided by :
Mr P. C. Harne
Prepared by:
Ajinkya N. Pathak
CONTENTS
1 • Introduction
2 • Need of PenetrationTesting
3 • Pentesting Phases
4 • Metasploit
5 • History
6 • Architecture
7 • Terminology
8 • Metasploit Interfaces
9 • Advantages & Disadvantages
10 • Future scope
11 • Conclusion
12 • References
Penetration Testing
“ Penetration testing
or pentesting involves
simulating real attacks to
assess the risk associated
with potential security
breaches ”
Need of Penetration Testing
 Companies invest millions of dollars in security program
 to protect critical infrastructure
 to prevent data breaches
 to identify security flaws
 to access vulnerabilities
 A Penetration Test is one of the most effective way to
identify weaknesses and deficiencies in these system.
Pentesting Phases
IntelligenceGathering
Threat Modelling
VulnerabilityAnalysis
Exploitation
Post Exploitation
Reporting
Metasploit
Metasploit is a free, open source penetration testing
framework currently acquired by Rapid7
Current versions are written using the Ruby language
World's largest database of well tested exploits
Open source platform for writing security tools and exploits
Create and execute more advanced attack
History
October of 2003, v1.0 of the Metasploit
Framework was created by H.D.Moore
Earlier coded in Perl
Later completely re-coded in Ruby
Acquired by Rapid7 in 2009 under some terms & conditions
Remains open source.
Tools
Libraries
REX
MSF core
MSF
base
Plugins
Modules
Auxiliary Payloads Exploits Encoders Nops
Architecture
Interfaces
Console
CLI
Web
Armitage
Terminology
code
Metasploit Interfaces
Msfconsole
Armitage(GUI Based)
Metasploit Interfaces
Metasploit Pro
Metasploit Interfaces
Advantages
 Open source
 Huge community
 Frequently updated
 Easy to deploy user specific exploit
Disadvantages
Difficult to learn
Lesser GUI based support
Can crash your system if not used wisely
Requires deep knowledge for exploit development
Being open source framework, it has got huge
community support. In order to face new security
challenges Metasploit is frequently updated for zero-day
vulnerabilities. More and more exploits will be made
available to its database for users. Upcoming versions
will be more efficient, user friendly, GUI-based, web-
based with customising options along with its
interactive console.
Future scope
Metasploit framework can also be called as ‘Swiss
Army knife ’ of penetration testers as it provides multiple
exploit, customisable, easy to redevelop according to the
requirements of the system . To secure our system and
prevent it from any type of threats , we should perform
the penetration testing.
Conclusion
References
1) David Kennedy, Jim O’Gorman, Devon Kearns and Mati Aharoni , ‘
METASPLOIT-The Penetration Tester’s Guide ’, No Starch Press.
2) Georgia Weidman, ‘ Penetration Testing ‘, No Starch Press
3) Karthik Ranganath, ‘ Instant Metasploit Starter ‘, PACKT Publishing
4) David Maynor, K. K. Mookhey, ‘ Metasploit Toolkit ’,Syngress Publishing
5) www.pentest-standard.org/index.php/PTES_Technical_Guidelines
6) https://www.metasploit.com/
7) https://www.offensive-security.com/metasploit-unleashed/introduction
Metaploit

Metaploit

  • 1.
    PENETRATION TESTING USING METASPLOIT Guidedby : Mr P. C. Harne Prepared by: Ajinkya N. Pathak
  • 2.
    CONTENTS 1 • Introduction 2• Need of PenetrationTesting 3 • Pentesting Phases 4 • Metasploit 5 • History 6 • Architecture 7 • Terminology 8 • Metasploit Interfaces 9 • Advantages & Disadvantages 10 • Future scope 11 • Conclusion 12 • References
  • 3.
    Penetration Testing “ Penetrationtesting or pentesting involves simulating real attacks to assess the risk associated with potential security breaches ”
  • 4.
    Need of PenetrationTesting  Companies invest millions of dollars in security program  to protect critical infrastructure  to prevent data breaches  to identify security flaws  to access vulnerabilities  A Penetration Test is one of the most effective way to identify weaknesses and deficiencies in these system.
  • 5.
  • 6.
    Metasploit Metasploit is afree, open source penetration testing framework currently acquired by Rapid7 Current versions are written using the Ruby language World's largest database of well tested exploits Open source platform for writing security tools and exploits Create and execute more advanced attack
  • 7.
    History October of 2003,v1.0 of the Metasploit Framework was created by H.D.Moore Earlier coded in Perl Later completely re-coded in Ruby Acquired by Rapid7 in 2009 under some terms & conditions Remains open source.
  • 8.
    Tools Libraries REX MSF core MSF base Plugins Modules Auxiliary PayloadsExploits Encoders Nops Architecture Interfaces Console CLI Web Armitage
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
    Advantages  Open source Huge community  Frequently updated  Easy to deploy user specific exploit
  • 14.
    Disadvantages Difficult to learn LesserGUI based support Can crash your system if not used wisely Requires deep knowledge for exploit development
  • 15.
    Being open sourceframework, it has got huge community support. In order to face new security challenges Metasploit is frequently updated for zero-day vulnerabilities. More and more exploits will be made available to its database for users. Upcoming versions will be more efficient, user friendly, GUI-based, web- based with customising options along with its interactive console. Future scope
  • 16.
    Metasploit framework canalso be called as ‘Swiss Army knife ’ of penetration testers as it provides multiple exploit, customisable, easy to redevelop according to the requirements of the system . To secure our system and prevent it from any type of threats , we should perform the penetration testing. Conclusion
  • 17.
    References 1) David Kennedy,Jim O’Gorman, Devon Kearns and Mati Aharoni , ‘ METASPLOIT-The Penetration Tester’s Guide ’, No Starch Press. 2) Georgia Weidman, ‘ Penetration Testing ‘, No Starch Press 3) Karthik Ranganath, ‘ Instant Metasploit Starter ‘, PACKT Publishing 4) David Maynor, K. K. Mookhey, ‘ Metasploit Toolkit ’,Syngress Publishing 5) www.pentest-standard.org/index.php/PTES_Technical_Guidelines 6) https://www.metasploit.com/ 7) https://www.offensive-security.com/metasploit-unleashed/introduction