In this tutorial we are going to show you how to hack a Linux OS using a tool in kali linux called Metasploit. Metasploit is an inbuilt tool in kali linux which is so powerful that it can perform DOS and DDOS attacks also. One thing to remember is that you should perform foot printing and vulnerability analysis before starting this attack. It works only if there any vulnerabilities in target system.
Execute the following commands to start Metasploit framework.
Consider metasploitable2 or your own linux system as a target for this practical. Perform port scan using nmap to identify vulnerable services on the target machine. This trick works only on the LAN level.
It is identified that the target is running a vulnerable version of vsftpd on port number 21. To exploit the target machine with the help of vulnerable software running on port 21 follow the steps below.
Use search command to search exploit for vsftpd 2.3.4
Execute the following command to load exploit (use command is used to load exploits).
By executing show options command, we can view options that need to be configured for exploit.
To set RHOST value, execute the following command.
To list all suitable payloads that work with the above exploit, execute show payloads command
To configure payload, execute the set command as shown below
Execute show options command, to view options that need to be configured for payload.
To set LHOST and LPORT values for payload, execute the following command.
Finally, execute the exploit command to gain access to the target machine.
After successful execution of exploit we can finally Linux commands.
By executing the above steps you will be able to hack linux operating system. Note a point that this attack can be performed only on the LAN level and not on another systems which are far away.
ALTERNATE 2
Steps to hack Linux OS using Metasploit framework
Consider metasploitable2 as a target for this practical. After performing a port scan using nmap, we can observe that the target is running UnrealIRC on port number 6667. To exploit the target, start Metasploit framework and search for unrealirc. Load exploit and set RHOST and RPORT options.
Select a payload that suits our requirements, set payload and payload options as shown below.
Verify exploit and payload options before running exploit command. RHOST and LHOST must be target and attackers IP addresses respectively. RPORT value, in this case, is 6667 as we are targeting the vulnerable application running on this port at target’s end. LPORT can be any valid port number on which attacker want to handle the reverse connection.
Executing exploit command will help us gain access to the target machine.
After gaining access to the target machine, we can execute Linux commands to explore directories and do more.
To earn money with dropshipping and start your own business check out this post
Before trying to attack any system read more about Metasploit framework and its commands. Always use proxy to save yourself:)
Happy Hacking.
Execute the following commands to start Metasploit framework.
Consider metasploitable2 or your own linux system as a target for this practical. Perform port scan using nmap to identify vulnerable services on the target machine. This trick works only on the LAN level.
It is identified that the target is running a vulnerable version of vsftpd on port number 21. To exploit the target machine with the help of vulnerable software running on port 21 follow the steps below.
Use search command to search exploit for vsftpd 2.3.4
Execute the following command to load exploit (use command is used to load exploits).
To set RHOST value, execute the following command.
To list all suitable payloads that work with the above exploit, execute show payloads command
To configure payload, execute the set command as shown below
Execute show options command, to view options that need to be configured for payload.
To set LHOST and LPORT values for payload, execute the following command.
Finally, execute the exploit command to gain access to the target machine.
After successful execution of exploit we can finally Linux commands.
By executing the above steps you will be able to hack linux operating system. Note a point that this attack can be performed only on the LAN level and not on another systems which are far away.
ALTERNATE 2
Steps to hack Linux OS using Metasploit framework
Consider metasploitable2 as a target for this practical. After performing a port scan using nmap, we can observe that the target is running UnrealIRC on port number 6667. To exploit the target, start Metasploit framework and search for unrealirc. Load exploit and set RHOST and RPORT options.
Select a payload that suits our requirements, set payload and payload options as shown below.
Verify exploit and payload options before running exploit command. RHOST and LHOST must be target and attackers IP addresses respectively. RPORT value, in this case, is 6667 as we are targeting the vulnerable application running on this port at target’s end. LPORT can be any valid port number on which attacker want to handle the reverse connection.
Executing exploit command will help us gain access to the target machine.
After gaining access to the target machine, we can execute Linux commands to explore directories and do more.
To earn money with dropshipping and start your own business check out this post
Before trying to attack any system read more about Metasploit framework and its commands. Always use proxy to save yourself:)
Happy Hacking.
No comments:
Post a Comment