Metasploit is an exploitation framework. That means it offers a framework from which to launch exploit code that can be used for the penetration of computer systems. It has a large list of exploits and a variety of payloads to be delivered by the exploit.

The Metasploit Project

The Metasploit Framework
What is it?
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

What does it do?
The framework consists of tools, libraries, modules, and user interfaces. The basic function of the framework is a module launcher, allowing the user to configure an exploit module and launch it at a target system. If the exploit succeeds, the payload is executed on the target and the user is provided with a shell to interact with the payload.

The most interesting payload available with Metasploit is probably the meterpreter. Meterpreter injects itself into a running process on the target system and offers a variety of tools including: dumping password hashes, file system commands, network commands, and process commands.

Abstract: Meterpreter, short for The Meta-Interpreter is an advanced payload that is included in the Metasploit Framework. Its purpose is to provide complex and advanced features that would otherwise be tedious to implement purely in assembly. The way that it accomplishes this is by allowing developers to write their own extensions in the form of shared object (DLL) files that can be uploaded and injected into a running process on a target computer after exploitation has occurred. Meterpreter and all of the extensions that it loads are executed entirely from memory and never touch the disk, thus allowing them to execute under the radar of standard Anti-Virus detection.

Leave a Reply

You must be logged in to post a comment.