Skip to main content

Posts

Showing posts from July, 2011

Introduction to Metasploit

Metasploit Cheat Sheet You already know what a vulnerability is. An exploit is a piece of code written to take advantage of a particular vulnerability.  A payload is a piece of code to be executed through said exploit. Have a look at the Metasploit Framework. It is simply a collection of exploits and payloads. Each exploit can be attached with various payloads like reverse or bind shells, the meterpreter shell etc. The beauty of the Metasploit Framework is that it is modular. You can mix and match different payloads and exploits to achieve the needed results. From < https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf > Metasploit The Metasploit Framework is a development platform for developing and using security tools and exploits. Metasploit Meterpreter Meterpreter is a payload within the Metasploit Framework that provides control over an exploited target system, running as a DLL loaded inside of any process on a target machine. Meta

windows command

query status of a service windows> sc query <service_name> state query qc change startup type to demand (a manually started service). this will change the service startup to manual which can be started later windows> sc config tlntsvr start= demand turn service on windows> sc start tlntsvr to add a user windows> net user [username] [passwd] /add add a local grp to host windows> net localgroup [grp name] /add add a user to the local grp windows> net localgroup [grp name] [username] /add change the value to 0 to allow RDP connection from blocked (1) to allowed (0). on most windows rdp service is started but system is configured to deny terminal service connection from rdp client. this setting is controlled by a regstry key called fdenyconnections. add will overwrite exisitng settings. /v value that needs to be changed. windows> reg add "hklm\system\currentcontolset\control\terminal\server"/v fdenytsconnections /t reg_dword /d 0 see all the valriable w