Metasploit是一個免費的、可下載的框架,通過它可以很容易地獲取、開發並對計算機軟件漏洞實施攻擊。它本身附帶數百個已知軟件漏洞的專業級漏洞攻擊工具。當H.D. Moore在2003年發布Metasploit時,計算機安全狀況也被永久性地改變了。仿佛一夜之間,任何人都可以成為黑客,每個人都可以使用攻擊工具來攻擊那些未打過補丁或者剛剛打過補丁的漏洞。軟件廠商再也不能推遲發布針對已公布漏洞的補丁了,這是因為Metasploit團隊一直都在努力開發各種攻擊工具,並將它們貢獻給所有Metasploit用戶。
實驗環境
centos6.5_x64
實驗軟件
pgdg-centos94-9.4-1.noarch.rpm
yaml-0.1.6.tar.gz
ruby-2.2.4.tar.gz
nmap-7.12.tar.bz2
metasploit-framework.git
軟件安裝
rpm -ivh pgdg-centos94-9.4-1.noarch.rpm
yum install -y postgresql94-server postgresql94-devel postgresql94
yum groupinstall -y 'Development Tools'
yum install -y sqlite-devel libxslt-devel libxml2-devel java-1.7.0-openjdk libpcap-devel nano openssl-devel zlib-devel libffi-devel gdbm-devel readline-devel nano wget git
gem install wirble pg sqlite3 msgpack activerecord redcarpet rspec simplecov yard bundler
tar zxvf yaml-0.1.6.tar.gz
cd yaml-0.1.6
./configure --prefix=/usr/local/
make
make install
tar zxvf ruby-2.2.4.tar.gz
cd ruby-2.2.4
./configure --prefix=/usr/local --with-opt-dir=/usr/local/lib
make
make install
tar jxvf nmap-7.12.tar.bz2
cd nmap-7.12
./configure
make
make install
exclude=postgresql*
service postgresql-9.4 initdb
service postgresql-9.4 start
chkconfig --level 35 postgresql-9.4 on
echo export PATH=/usr/pgsql-9.4/bin:$PATH >> /etc/bashrc
source ~/.bashrc
su - postgres
su - postgres
-bash-4.1$ createuser msf -P -S -R -D
Enter password for new role:
Enter it again:
createdb -O msf msf
exit
cp /var/lib/pgsql/9.4/data/pg_hba.conf /var/lib/pgsql/9.4/data/pg_hba.conf.bak
vim /var/lib/pgsql/9.4/data/pg_hba.conf
77 # TYPE DATABASE USER ADDRESS METHOD
78
79 # "local" is for Unix domain socket connections only
80 local all all md5
81 # IPv4 local connections:
82 host all all 127.0.0.1/32 md5
83 # IPv6 local connections:
84 host all all ::1/128 md5
85 # Allow replication connections from localhost, by a user with thed
86 # replication privilege.
87 #local replication postgres peer
88 #host replication postgres 127.0.0.1/32 ident
89 #host replication postgres ::1/128 ident
service postgresql-9.4 restart
cd /opt/
git clone https://github.com/rapid7/metasploit-framework.git
cd metasploit-framework
bash -c 'for MSF in $(ls msf*); do ln -s /opt/metasploit-framework/$MSF /usr/local/bin/$MSF;done'
ln -s /opt/metasploit-framework/armitage /usr/local/bin/armitage
bundle install
bundle install
Don't run Bundler as root. Bundler can ask for sudo if it is needed, and
installing your bundle as root will break this application for all non-root users
on this machine.
Fetching gem metadata from https://rubygems.org/
Fetching version metadata from https://rubygems.org/
Fetching dependency metadata from https://rubygems.org/
Resolving dependencies....
Installing rake 11.2.2
Using i18n 0.7.0
Installing json 1.8.3 with native extensions
vim /opt/metasploit-framework/database.yml
development: &pgsql
adapter: postgresql
database: metasploit-credential_development1
username: msf
password:
host: localhost 修改為 127.0.0.1
port: 5432
pool: 5 修改為 75
timeout: 5
min_messages: warning
test:
<<: *pgsql
database: metasploit-credential_test1
netstat -tuplna | grep 5432
tcp 0 0 127.0.0.1:5432 0.0.0.0:* LISTEN 30767/postmaster
tcp 0 0 ::1:5432 :::* LISTEN 30767/postmaster
echo export MSF_DATABASE_CONFIG=/opt/metasploit-framework/database.yml >> /etc/bashrc
source ~/.bashrc
驗證
msfconsole
http://xxxxxx/Linuxjc/1156055.html TechArticle