2
Most read
11
Most read
14
Most read
Introduction To Exploitation & Metasploit
What is penetration testing ?
 It’s the process to identify security vulnerabilities in an
application by evaluating the system or network with
various malicious techniques.
 A penetration testing is a method of evaluating the
security of a computer system.
 Purpose of this test is to secure important data from
outsiders like hackers who can have unauthorized
access to system.
What is penetration testing ?
 Once vulnerability is identified it is used to exploit
system in order to gain access to sensitive information.
 Causes of vulnerabilities:
- Design and development errors
- Poor system configuration
- Human errors
Why conduct a penetration
testing?
 Government data must be secured while transferring
between different systems.
 Protecting your brand by avoiding loss of consumer
confidence and business reputation.
 To secure user data.
 To find security vulnerabilities in an application.
What can be tested ?
 Operating system, applications, database, networking
equipments etc.
 Dynamic websites, in-house applications etc.
 Telephony (war-dialing, remote access etc.)
 Personnel (screening process, social engineering etc.)
 Physical (access controls, dumpster diving etc.)
 Wireless (wifi, Bluetooth, IR, GSM, RFID etc.)
What is metasploit ?
 The Metasploit project is an open-source, computer
security project which provides information about
security vulnerabilities and aids in penetration testing
and IDS signature development.
 Metasploit is an framework which is used for the
hacking of different kinds of applications, operating
systems, web applications etc.
What is metasploit ?
 Metasploit contain various exploits, payloads, modules
etc.
 Metasploit Framework is especially used by many of
the hackers to generate payloads and attack the
systems.
 As Metasploit is an open source where any one can use
it. This framework supports different operating
systems like windows, linux ,mac os x etc.
Metasploit terms
 Exploit  used to take advantage of a security flaw
within a system, network, or application.
 Payload  is code that our victim computer to
execute by the Metasploit framework.
 Module  a small piece of code that can be added to
the Metasploit framework to execute an attack.
 Shell-code  a small piece of code used as a payload.
What is a vulnerability?
 A vulnerability is a security hole in a piece of software,
hardware or operating system that provides a potential
angle to attack the system.
 A vulnerability can be as simple as weak passwords or
as complex as buffer overflows or SQL injection
vulnerabilities.
What is an exploit?
 To take advantage of a vulnerability, you often need an
exploit, a small and highly specialized computer
program whose only reason of being is to take
advantage of a specific vulnerability and to provide
access to a computer system.
 Exploits often deliver a payload to the target system to
grant the attacker access to the system.
What is a payload?
 A payload is the piece of software that lets you control
a computer system after it’s been exploited.
 The payload is typically attached to and delivered by
the exploit.
 Metasploit most popular payload is called Meterpreter,
which enables you to do all sorts of funky stuff on the
target system. For example, you can upload and
download files from the system, take screenshots, and
collect password hashes etc.
What is msfconsole ?
 MSFconsole is an all-in-one interface to most of the
features in Metasploit.
 MSFconsole can be used to launch attacks, creating
listeners, and much, much more.
 Commands :
 Show exploits
 Show payloads
 Show options
 Use exploit
Commands
 set payload
 Set LHOST
 Set RHOST
 Back
 Info
 Session
 Session –l
 Session –i 1
Meterpreter commands
 Getuid -> show uid
 Ps -> show active process
 Migrate -> command used when hacker want to
migrate his process to any administrative privileges
process.
 Hashdump -> to dump password hash.
 Screenshot -> to take screenshot of victim.
 Shell -> to enter into the victim shell.
 download C:<file name>
 upload C:<file name>
More Meterpreter commands
 keyscan_start -> start sniffing key strokes.
 keyscan_dump
 keyscan_stop
 uictl disable keyboard
 uictl enable keyboard
Demonstration - Service Exploitation
Reconnaissance
 Ports and service scan of target system
>> nmap -sS -p445 -sV -v <victim_IP>
Exploitation – ms17_010_eternalblue
>> msfconsole
msf5 > use exploit/windows/smb/ms17_010_eternalblue
msf5 > show options
msf5 > set RHOST <victim_IP>
Exploitation – ms17_010_eternalblue
Exploitation – ms17_010_eternalblue
Introduction To Exploitation & Metasploit

More Related Content

PPTX
HyperText Transfer Protocol (HTTP)
PDF
Nessus Software
PPTX
Metasploit
PPTX
PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility by Satosh...
PPTX
Malware ppt final.pptx
PPTX
Privileged Access Management (PAM)
PPT
Aqidah,syariah,dakwah
PPTX
Introduction to Metasploit
 
HyperText Transfer Protocol (HTTP)
Nessus Software
Metasploit
PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility by Satosh...
Malware ppt final.pptx
Privileged Access Management (PAM)
Aqidah,syariah,dakwah
Introduction to Metasploit
 

What's hot (20)

PPTX
Metasploit framwork
PPTX
Metasploit
PPTX
Metasploit framework in Network Security
PPTX
Vulnerability assessment and penetration testing
PPTX
Understanding NMAP
PPTX
Penetration Testing
PDF
Threat Modeling Basics with Examples
PPTX
VAPT PRESENTATION full.pptx
PDF
penetration test using Kali linux ppt
PPTX
Finalppt metasploit
PPTX
Penetration testing reporting and methodology
PPTX
Security vulnerability
PPTX
Vapt life cycle
PDF
Penetration testing web application web application (in) security
PPTX
Advanced persistent threat (apt)
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PPTX
Introduction to penetration testing
Metasploit framwork
Metasploit
Metasploit framework in Network Security
Vulnerability assessment and penetration testing
Understanding NMAP
Penetration Testing
Threat Modeling Basics with Examples
VAPT PRESENTATION full.pptx
penetration test using Kali linux ppt
Finalppt metasploit
Penetration testing reporting and methodology
Security vulnerability
Vapt life cycle
Penetration testing web application web application (in) security
Advanced persistent threat (apt)
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Advanced Persistent Threats (APTs) - Information Security Management
Introduction to penetration testing
Ad

Similar to Introduction To Exploitation & Metasploit (20)

PPTX
Pentesting with linux
PPTX
Introduction To Ethical Hacking
PDF
Exploits Attack on Windows Vulnerabilities
PPTX
Metasploit
PPTX
COMPUTER SECURITY AND OPERATING SYSTEM
PDF
Module 5 (system hacking)
PDF
Modern malware and threats
PDF
01_Metasploit - The Elixir of Network Security
PPTX
PDF
OS-Anatomy-Article
PPT
Software security
PPTX
Final project.ppt
PPTX
Cisco Security Agent - Theory, Practice, and Policy
PDF
Virtualizacion y sistemas operativos por microsoft. Contempla seguridad
PDF
systemhacking-170425062200.pdf
PPTX
System hacking
 
PPTX
Ethical hacking/ Penetration Testing
PPT
Ch11 system administration
PPTX
Types of malicious software and remedies
Pentesting with linux
Introduction To Ethical Hacking
Exploits Attack on Windows Vulnerabilities
Metasploit
COMPUTER SECURITY AND OPERATING SYSTEM
Module 5 (system hacking)
Modern malware and threats
01_Metasploit - The Elixir of Network Security
OS-Anatomy-Article
Software security
Final project.ppt
Cisco Security Agent - Theory, Practice, and Policy
Virtualizacion y sistemas operativos por microsoft. Contempla seguridad
systemhacking-170425062200.pdf
System hacking
 
Ethical hacking/ Penetration Testing
Ch11 system administration
Types of malicious software and remedies
Ad

More from Raghav Bisht (19)

PPTX
OSINT - Yandex Search
PPTX
OSINT - Twitter Searches
PPTX
OSINT Tool - Reconnaissance with Recon-ng
PPTX
OSINT Tool - Reconnaissance with Maltego
PPTX
OSINT - Linkedin Search Slides
PPTX
OSINT - Facebook Searches
PPTX
Osint - Dark side of Internet
PDF
Intrusion Detection System Project Report
DOCX
Ethical Hacking (CEH) - Industrial Training Report
PPTX
Sql injection attack
PPTX
Os Command Injection Attack
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
PPTX
Directory Traversal & File Inclusion Attacks
DOCX
Antivirus Bypass Techniques - 2016
PDF
ccna practical notes
PDF
Hacking in shadows By - Raghav Bisht
DOCX
Web-servers & Application Hacking
PPTX
Introduction To Hacking
PDF
Windows Registry Tips & Tricks
OSINT - Yandex Search
OSINT - Twitter Searches
OSINT Tool - Reconnaissance with Recon-ng
OSINT Tool - Reconnaissance with Maltego
OSINT - Linkedin Search Slides
OSINT - Facebook Searches
Osint - Dark side of Internet
Intrusion Detection System Project Report
Ethical Hacking (CEH) - Industrial Training Report
Sql injection attack
Os Command Injection Attack
Introduction To Vulnerability Assessment & Penetration Testing
Directory Traversal & File Inclusion Attacks
Antivirus Bypass Techniques - 2016
ccna practical notes
Hacking in shadows By - Raghav Bisht
Web-servers & Application Hacking
Introduction To Hacking
Windows Registry Tips & Tricks

Recently uploaded (20)

PPTX
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
PDF
TicketRoot: Event Tech Solutions Deck 2025
PPTX
From XAI to XEE through Influence and Provenance.Controlling model fairness o...
PPTX
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
PPTX
Information-Technology-in-Human-Society (2).pptx
PDF
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
PPTX
maintenance powerrpoint for adaprive and preventive
PDF
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
PDF
Decision Optimization - From Theory to Practice
PDF
【AI論文解説】高速・高品質な生成を実現するFlow Map Models(Part 1~3)
PDF
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
PDF
Peak of Data & AI Encore: Scalable Design & Infrastructure
PDF
Advancements in abstractive text summarization: a deep learning approach
PDF
TrustArc Webinar - Data Minimization in Practice_ Reducing Risk, Enhancing Co...
PDF
Altius execution marketplace concept.pdf
PDF
Secure Java Applications against Quantum Threats
PDF
NewMind AI Journal Monthly Chronicles - August 2025
PDF
The Digital Engine Room: Unlocking APAC’s Economic and Digital Potential thro...
PDF
Technical Debt in the AI Coding Era - By Antonio Bianco
PDF
Ebook - The Future of AI A Comprehensive Guide.pdf
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
TicketRoot: Event Tech Solutions Deck 2025
From XAI to XEE through Influence and Provenance.Controlling model fairness o...
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
Information-Technology-in-Human-Society (2).pptx
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
maintenance powerrpoint for adaprive and preventive
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
Decision Optimization - From Theory to Practice
【AI論文解説】高速・高品質な生成を実現するFlow Map Models(Part 1~3)
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
Peak of Data & AI Encore: Scalable Design & Infrastructure
Advancements in abstractive text summarization: a deep learning approach
TrustArc Webinar - Data Minimization in Practice_ Reducing Risk, Enhancing Co...
Altius execution marketplace concept.pdf
Secure Java Applications against Quantum Threats
NewMind AI Journal Monthly Chronicles - August 2025
The Digital Engine Room: Unlocking APAC’s Economic and Digital Potential thro...
Technical Debt in the AI Coding Era - By Antonio Bianco
Ebook - The Future of AI A Comprehensive Guide.pdf

Introduction To Exploitation & Metasploit

  • 2. What is penetration testing ?  It’s the process to identify security vulnerabilities in an application by evaluating the system or network with various malicious techniques.  A penetration testing is a method of evaluating the security of a computer system.  Purpose of this test is to secure important data from outsiders like hackers who can have unauthorized access to system.
  • 3. What is penetration testing ?  Once vulnerability is identified it is used to exploit system in order to gain access to sensitive information.  Causes of vulnerabilities: - Design and development errors - Poor system configuration - Human errors
  • 4. Why conduct a penetration testing?  Government data must be secured while transferring between different systems.  Protecting your brand by avoiding loss of consumer confidence and business reputation.  To secure user data.  To find security vulnerabilities in an application.
  • 5. What can be tested ?  Operating system, applications, database, networking equipments etc.  Dynamic websites, in-house applications etc.  Telephony (war-dialing, remote access etc.)  Personnel (screening process, social engineering etc.)  Physical (access controls, dumpster diving etc.)  Wireless (wifi, Bluetooth, IR, GSM, RFID etc.)
  • 6. What is metasploit ?  The Metasploit project is an open-source, computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development.  Metasploit is an framework which is used for the hacking of different kinds of applications, operating systems, web applications etc.
  • 7. What is metasploit ?  Metasploit contain various exploits, payloads, modules etc.  Metasploit Framework is especially used by many of the hackers to generate payloads and attack the systems.  As Metasploit is an open source where any one can use it. This framework supports different operating systems like windows, linux ,mac os x etc.
  • 8. Metasploit terms  Exploit  used to take advantage of a security flaw within a system, network, or application.  Payload  is code that our victim computer to execute by the Metasploit framework.  Module  a small piece of code that can be added to the Metasploit framework to execute an attack.  Shell-code  a small piece of code used as a payload.
  • 9. What is a vulnerability?  A vulnerability is a security hole in a piece of software, hardware or operating system that provides a potential angle to attack the system.  A vulnerability can be as simple as weak passwords or as complex as buffer overflows or SQL injection vulnerabilities.
  • 10. What is an exploit?  To take advantage of a vulnerability, you often need an exploit, a small and highly specialized computer program whose only reason of being is to take advantage of a specific vulnerability and to provide access to a computer system.  Exploits often deliver a payload to the target system to grant the attacker access to the system.
  • 11. What is a payload?  A payload is the piece of software that lets you control a computer system after it’s been exploited.  The payload is typically attached to and delivered by the exploit.  Metasploit most popular payload is called Meterpreter, which enables you to do all sorts of funky stuff on the target system. For example, you can upload and download files from the system, take screenshots, and collect password hashes etc.
  • 12. What is msfconsole ?  MSFconsole is an all-in-one interface to most of the features in Metasploit.  MSFconsole can be used to launch attacks, creating listeners, and much, much more.  Commands :  Show exploits  Show payloads  Show options  Use exploit
  • 13. Commands  set payload  Set LHOST  Set RHOST  Back  Info  Session  Session –l  Session –i 1
  • 14. Meterpreter commands  Getuid -> show uid  Ps -> show active process  Migrate -> command used when hacker want to migrate his process to any administrative privileges process.  Hashdump -> to dump password hash.  Screenshot -> to take screenshot of victim.  Shell -> to enter into the victim shell.  download C:<file name>  upload C:<file name>
  • 15. More Meterpreter commands  keyscan_start -> start sniffing key strokes.  keyscan_dump  keyscan_stop  uictl disable keyboard  uictl enable keyboard
  • 16. Demonstration - Service Exploitation
  • 17. Reconnaissance  Ports and service scan of target system >> nmap -sS -p445 -sV -v <victim_IP>
  • 18. Exploitation – ms17_010_eternalblue >> msfconsole msf5 > use exploit/windows/smb/ms17_010_eternalblue
  • 19. msf5 > show options msf5 > set RHOST <victim_IP> Exploitation – ms17_010_eternalblue