eJPT
  • 馃憢Welcome
  • Tools
    • 馃敪Escaneo y Enumeraci贸n
  • SECTION 1: Assessment Methodologies
    • Assessment Methodologies: Information Gathering
      • Introducci贸n a la Recopilaci贸n de Informaci贸n
        • Start Quiz
      • Passive Information Gathering
      • Active Information Gathering
    • Assessment Methodologies: Footprinting & Scanning
      • Introduction
      • Networking Primer
      • Host Discovery
      • Port Scanning
      • Evasion, Scan Performance & Output
      • Page
      • Challenges
    • Assessment Methodologies: Enumeration
      • Overview
      • SMB Lesson
      • FTP Lesson
      • SSH Lesson
      • HTTP Lesson
      • SQL Lesson
    • Assessment Methodologies: Vulnerability Assessment
      • Vulnerability Assessment
      • Course Labs
  • SECTION 2: Host & Networking Auditing
    • Assessment Methodologies: Auditing Fundamentals
      • Assessment Methodologies
      • Practice
  • SECTION 3: Host & Network Penetration Testing
    • Host & Network Penetration Testing: System/Host Based Attacks
      • Introduction to Attacks
      • Windows Vulnerabilities
      • Exploiting Windows Vulnerabilities
      • Windows Privilege Escalation
      • Windows File System Vulnerabilities
      • Windows Credential Dumping
      • Linux Vulnerabilities
      • Exploiting Linux Vulnerabilities
      • Linux Privilege Escalation
      • Linux Credential Dumping
      • Conclusion
    • Host & Network Penetration Testing: Network-Based Attacks
      • Network-Based Attacks
    • Host & Network Penetration Testing: The Metasploit Framework (MSF)
      • Metasploit
        • Metasploit Fundamentals
      • Information Gathering & Enumeration
        • Nmap
        • Enumeration
      • Vulnerability Scanning
        • MSF
        • Nessus
        • Web Apps
      • Client-Side Attacks
        • Payloads
        • Automating
      • Exploitation
        • Windows Exploitation
        • Linux Exploitation
        • Post Exploitation Fundamentals
        • Windows Post Exploitation
        • Linux Post Exploitation
      • Armitage
        • Metasploit GUIs
    • Host & Network Penetration Testing: Exploitation
      • Introduction To Exploitation
      • Vulnerability Scanning Overview
      • Exploits
        • Searching For Exploits
        • Fixing Exploits
      • Shells
      • Frameworks
      • Windows
      • Linux
      • Obfuscation
    • Host & Network Penetration Testing: Post-Exploitation
      • Introduction
      • Windows Enumeration
      • Linux Enumeration
      • Transferring Files
      • Shells
      • Escalation
        • Windows Privilege Escalation
        • Linux Privilege Escalation
      • Persistence
        • Windows Persistence
        • Linux Persistence
      • Dumping & Cracking
        • Windows Password Hashes
        • Linux Password Hashes
      • Pivoting Lesson
      • Clearing
  • Host & Network Penetration Testing: Social Engineering
    • Social Engineering
  • SECTION 4: Web Application Penetration Testing
    • Introduction to the Web & HTTP Protocol
      • Web Applications
      • HTTP Protocol
        • HTTP/S Protocol Fundamentals
        • Website Crawling & Spidering
Powered by GitBook
On this page
  • Automating Metasploit With Resource Scripts
  • Metasploit Resource Scripts
  • Demo: Automating Metasploit With Resource Scripts
  • Quiz: Automating Metasploit With Resource Scripts
  1. SECTION 3: Host & Network Penetration Testing
  2. Host & Network Penetration Testing: The Metasploit Framework (MSF)
  3. Client-Side Attacks

Automating

Automating Metasploit With Resource Scripts

Metasploit Resource Scripts

Los scripts de recursos de Metasploit son una caracter铆stica excelente de MSF que le permite automatizar tareas y comandos repetitivos.

Funcionan de manera similar a los batch scripts , por lo que puede especificar un conjunto de comandos de Msfconsole que desea ejecutar de manera secuencial.

Puede cargar el script con Msfconsole y automatizar la ejecuci贸n de los comandos que especific贸 en el script de recursos.

Podemos usar scripts de recursos para automatizar varias tareas, como configurar controladores m煤ltiples, as铆 como cargar y ejecutar cargas 煤tiles.

Demo: Automating Metasploit With Resource Scripts

# Lista de scripts que vienen preempacados
ls -al /usr/share/metasploit-framework/scripts/resource/

# Puede abrir uno de los archivos de aqui
vim /usr/share/metasploit-framework/scripts/resource/<script>.rc

# Automatizacion configuracion MSF
vim handler.rc
# Port scan
vim portscan.rc

vim db_status.rc
# Script handler.rc
/use multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST
set LPORT
# Script portscan.rc
use auxiliary/scanner/portscan/tcp
set RHOSTS <Target>
run
# Script db_status
db status
workspace
workspace -a TEST
msfconsole -r handler.rc
msfconsole -r portscan.rc
msfconsole -r db_status.rc
# Script desde MSF Console 

# Despues de ejecutar una serie de lineas de comenados se puede exportar todos 
# los comandos ejeuctados en MSF Console
msf6 auxiliary( scanner/portscan/tcp) > makerc ~/Desktop/portscan.rc
Saving last 3 commands to ~/Desktop/portscan.rc.

# Script archivo
cat portscan.rc
use auxiliary/scanner/portscan/tcp
set RHOSTS 10.10.10.7
run

Quiz: Automating Metasploit With Resource Scripts

PreviousPayloadsNextExploitation

Last updated 9 months ago