10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

92 CHAPTER 4 Filling the toolbox<br />

# now install correct version of Ruby<br />

\curl -o rvm.sh -L get.rvm.io && cat rvm.sh j bash -s stable\<br />

- -autolibs¼enabled - -ruby¼1.9.3<br />

source /usr/local/rvm/scripts/rvm<br />

# now get code from github.com<br />

cd /opt<br />

git clone git://github.com/rapid7/metasploit-framework.git<br />

# install gems<br />

cd metasploit-framework<br />

gem install bundler<br />

bundle install<br />

While not required, having the postgresql database installed can be convenient<br />

when working <strong>with</strong> Metasploit. Detailed information how to configure postgresql to<br />

work <strong>with</strong> Metasploit can be found at https://fedoraproject.org/wiki/Metasploit_Post<br />

gres_Setup. Once you have Metasploit installed, a complete online book on its use<br />

is available at http://www.offensive-security.com/metasploit-unleashed/Main_Page.<br />

SUMMARY<br />

We have covered quite a bit of ground in this chapter. We learned how to add a lightweight<br />

graphical desktop to a console only Ubuntu system. Then, we discovered how<br />

to leverage repositories in order to add the bulk of tools to our base system. The<br />

remaining tools from our Christmas list were added through a combination of locating<br />

packages <strong>and</strong> compiling from source code. Numerous ways of compiling source<br />

code for the Beagles were presented in detail. A few essential tools were also discussed.<br />

All of this was made considerably easier through automation via shell scripts.<br />

Now that we have a full-on penetration testing platform to work <strong>with</strong>, we will<br />

discuss how to power our devices in the next chapter.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!