Finding vulnerabilities with Metasploit
The following article was written for college purposes.
What is Metasploit?
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7.
Its best-known sub-project is the open-source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.
Finding vulnerabilities
Mapping the network
First let’s use nmap to map our network. After you find your IP address I went to metasploit and typed:
db_nmap 192.168.24.0/24
This command will store the hosts found by the nmap.
Hosts found
As you can see the nmap foun a couple of hosts up:
Just type hosts to check this out.
Services up
The next step is to find which services are up and what ports are they using. You can gather this information by using the following command:
services
Vulnerabilities found
Now you are able to find any vulnerabilities. Using the command:
vulns
In my case the metasploit didn’t found nothing to work with. As you can see:
In this tutorial, it was possible to find some vulnerabilities as you can see:
And after they find weaknesses, was time to exploit them:
The command they have used explores the vulnerabilities in the port 3306 (-p) and the service mysql (-s). Also the -i returns the information about the vulnerability.