19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

218<br />

Part IV: Hacking Operating Systems<br />

Figure 11-12:<br />

The main<br />

Metasploit<br />

console.<br />

1. Download and install Metasploit (currently at version 4.4) from<br />

www.metasploit.com/download.<br />

I use the Windows version; all you have to do is download and run the<br />

executable.<br />

2. After the installation is complete, run the Metasploit GUI (now<br />

referred to as MSFGUI), which is Metasploit’s main console.<br />

There’s also a web-based version of Metasploit that you can access<br />

through your browser (Metasploit Web), but I prefer the GUI interface.<br />

You see a screen similar to the one shown in Figure 11-12.<br />

3. Expand the Exploits option to see what exploits are available to run,<br />

as shown in Figure 11-13.<br />

If you know the specific vulnerability (say, Microsoft’s MS08-067), you<br />

can simply enter part or all of the search term (such as ms08) in the<br />

search field at the top and then click Find.<br />

4. After you find the exploit you want to run against your target system,<br />

simply double-click the exploit and then follow the steps starting with<br />

selecting the target operating system, as shown in Figure 11-14; click<br />

the Forward button.<br />

Select Automatic Targeting if it’s available; otherwise, make your<br />

best guess of which version of Windows is running and then click the<br />

Forward button.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!