Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

ELECTRONICS & COMMUNICATION DEPARTMENT

SUBJECT :- CYBER SECURITY (2150002)

TOPIC :- METASPLOIT

Presented by :- 170130111037
Guided by :- Prof. T. B. S.
CONTENTS
• INTRODUCTION
• WHAT IS METASPLOIT ?
• TYPICAL METASPLOIT ARCHITECTURE
• PAYLOADS
• REQUIREMENTS TO GET METASPLOIT
• USES AND BENEFITS
INTRODUCTION
• THE METASPLOIT PROJECT WAS UNDERTAKEN IN 2003 BY H.D. MOORE FOR USE AS A PERL-BASED PORTABLE NETWORK
TOOL, WITH ASSISTANCE FROM CORE DEVELOPER MATT MILLER. IT WAS FULLY CONVERTED TO RUBY BY 2007, AND THE
LICENSE WAS ACQUIRED BY RAPID7 IN 2009, WHERE IT REMAINS AS PART OF THE BOSTON-BASED COMPANY’S
REPERTOIRE OF IDS SIGNATURE DEVELOPMENT AND TARGETED REMOTE EXPLOIT, FUZZING, ANTI-FORENSIC, AND
EVASION TOOLS.
• PORTIONS OF THESE OTHER TOOLS RESIDE WITHIN THE METASPLOIT FRAMEWORK, WHICH IS BUILT INTO THE KALI
LINUX OS. RAPID7 HAS ALSO DEVELOPED TWO PROPRIETARY OPENCORE TOOLS, METASPLOIT PRO, METASPLOIT
EXPRESS.
• THIS FRAMEWORK HAS BECOME THE GO-TO EXPLOIT DEVELOPMENT AND MITIGATION TOOL. PRIOR TO METASPLOIT,
PEN TESTERS HAD TO PERFORM ALL PROBES MANUALLY BY USING A VARIETY OF TOOLS THAT MAY OR MAY NOT HAVE
SUPPORTED THE PLATFORM THEY WERE TESTING, WRITING THEIR OWN CODE BY HAND, AND INTRODUCING IT ONTO
NETWORKS MANUALLY. REMOTE TESTING WAS VIRTUALLY UNHEARD OF, AND THAT LIMITED A SECURITY SPECIALIST’S
REACH TO THE LOCAL AREA AND COMPANIES SPENDING A FORTUNE ON IN-HOUSE IT OR SECURITY CONSULTANTS.
WHAT

IS METASPLOIT ?
THE METASPLOIT FRAMEWORK IS A VERY POWERFUL TOOL WHICH CAN BE
USED BY CYBERCRIMINALS AS WELL AS ETHICAL HACKERS TO PROBE
SYSTEMATIC VULNERABILITIES ON NETWORKS AND SERVERS. BECAUSE IT’S
AN OPEN-SOURCE FRAMEWORK, IT CAN BE EASILY CUSTOMIZED AND USED
WITH MOST OPERATING SYSTEMS.
• WITH METASPLOIT, THEPEN TESTING TEAM CAN USE READY-MADE OR CUSTOM
CODE AND INTRODUCE IT INTO A NETWORK TO PROBE FOR WEAK SPOTS. AS
ANOTHER FLAVOR OFTHREAT HUNTING, ONCE FLAWS ARE IDENTIFIED AND
DOCUMENTED, THE INFORMATION CAN BE USED TO ADDRESS SYSTEMIC
WEAKNESSES AND PRIORITIZE SOLUTIONS.
• THIS FRAMEWORK BUNDLE IS A MUST-HAVE FOR ANYONE WHO IS A SECURITY ANALYST OR
PEN-TESTER. IT’S AN ESSENTIAL TOOL FOR DISCOVERING HIDDEN VULNERABILITIES USING A
VARIETY OF TOOLS AND UTILITIES. METASPLOIT ALLOWS YOU TO ENTER THE MIND OF A
HACKER AND USE THE SAME METHODS FOR PROBING AND INFILTRATING NETWORKS AND
SERVERS.
• HERE’S A DIAGRAM OF A TYPICAL METASPLOIT ARCHITECTURE:
PAYLOADS
THE FRAMEWORK ALSO CARRIES NEARLY 500 PAYLOADS, SOME OF WHICH INCLUDE:
• COMMAND SHELL PAYLOADS THAT ENABLE USERS TO RUN SCRIPTS OR RANDOM
COMMANDS AGAINST A HOST
• DYNAMICPAYLOADS THAT ALLOW TESTERS TO GENERATE UNIQUE PAYLOADS TO
EVADE ANTIVIRUS SOFTWARE
• METERPRETER PAYLOADS THAT ALLOW USERS TO COMMANDEER DEVICE
MONITORS USING VMC AND TO TAKE OVER SESSIONS OR UPLOAD AND DOWNLOAD
FILES
• STATIC
PAYLOADS THAT ENABLE PORT FORWARDING AND COMMUNICATIONS
BETWEEN NETWORKS
REQUIREMENTS TO GET METASPLOIT
• METASPLOIT IS AVAILABLE THROUGH OPEN-SOURCE INSTALLERS DIRECTLY FROM THE RAPID7
WEBSITE. IN ADDITION TO THE LATEST VERSION OF THE CHROME, FIREFOX, OR EXPLORER
BROWSERS, THE MINIMUM SYSTEM REQUIREMENTS ARE:
• OPERATING SYSTEMS:
1) UBUNTU LINUX 14.04 OR 16.04 LTS (RECOMMENDED)
2) WINDOWS SERVER 2008 OR 2012 R2
3) WINDOWS 7 SP1+, 8.1, OR 10
4)RED HAT ENTERPRISE LINUX SERVER 5.10, 6.5, 7.1, OR LATER
HARDWARE:
1) 2 GHZ+ PROCESSOR
2) MINIMUM 4 GB RAM, BUT 8 GB IS RECOMMENDED
3)MINIMUM 1 GB DISK SPACE, BUT 50 GB IS RECOMMENDED
USES AND BENIFITS
THANK YOU

You might also like