.

question

<<

mshroomz

Newbie
Newbie

Posts: 1

Joined: Wed Feb 06, 2008 9:17 am

Post Wed Feb 06, 2008 10:19 am

question

i just started using metasploit and i ran an exploit and it said successfull then said exploit running in background im wondering wut that ment i wanna know how u connect to a computer remotley then upload and execute a file somone please let me know how u do this or were i can learn too wich exploits that came on metasploit work best for xp systems?
<<

venom77

User avatar

Hero Member
Hero Member

Posts: 1905

Joined: Mon Dec 11, 2006 3:23 pm

Post Wed Feb 06, 2008 10:55 am

Re: question

<<

KrisTeason

User avatar

Hero Member
Hero Member

Posts: 515

Joined: Sat Sep 08, 2007 7:48 pm

Location: /dev/null

Post Wed Feb 06, 2008 11:34 am

Re: question

You may also want to look into Chris Gate's videos on Metasploit over at www.learnsecurityonline.com
Also might want a copy of the book "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research"
http://www.amazon.com/Metasploit-Penetr ... 605&sr=8-1
eCPPT (Silver/Gold), eWPT, GSEC, GISP, GCIH, OSCP, OSWP
<<

pseud0

User avatar

Recruiters
Recruiters

Posts: 210

Joined: Sat Nov 17, 2007 8:26 pm

Location: Detroit, Michigan

Post Wed Feb 06, 2008 12:43 pm

Re: question

Metasploit has a couple of "successful" messages.  One shows that whatever command you ran completed, one says the exploit was successful.  If the actual exploit was successful you should just check the connections with the sessions command.
CISSP, CISM, CISA, GCIH, GREM, CEH, HMFIC, KTHXBIROFLCOPTER
<<

bigwhiff

Newbie
Newbie

Posts: 14

Joined: Mon Jan 28, 2008 2:29 am

Location: Alaska

Post Wed Feb 06, 2008 4:33 pm

Re: question

Another nice little paper to reference is at http://www.radarhack.com/dir/papers/Met ... mmiesl.pdf

Best of luck to you.
-Jack
Jack Campbell
CCNP CCDP GCIH GHTQ C|EH
http://secauditor.wordpress.com
<<

LSOChris

Post Thu Feb 07, 2008 1:16 am

Re: question

exploit completed but no session was created = not vulnerable

if you ran one of the browser exploits you'll get something like
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:8080/tnW09CDI6Qnu
[*]  Local IP: http://172.16.16.140:8080/tnW09CDI6Qnu
[*] Server started.
[*] Exploit running as background job.

to see if you got any sessions do a:

sessions -l

then

session -i #

Return to Malware

Who is online

Users browsing this forum: No registered users and 0 guests

.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software