Metasploit是一个免费的、可下载的框架,通过它可以很容易地获取、开发并对计算机软件漏洞实施攻击。它本身附带数百个已知软件漏洞的专业级漏洞攻击工具。当H.D. Moore在2003年发布Metasploit时,计算机安全状况也被永久性地改变了。仿佛一夜之间,任何人都可以成为黑客,每个人都可以使用攻击工具来攻击那些未打过补丁或者刚刚打过补丁的漏洞。软件厂商再也不能推迟发布针对已公布漏洞的补丁了,这是因为Metasploit团队一直都在努力开发各种攻击工具,并将它们贡献给所有Metasploit用户。
实验环境
centos6.5_x64
实验软件
pgdg-centos94-9.4-1.noarch.rpm
yaml-0.1.6.tar.gz
ruby-2.2.4.tar.gz
nmap-7.12.tar.bz2
Metasploit-framework.git
软件安装
rpm -ivh pgdg-centos94-9.4-1.noarch.rpm
yum install -y postgresql94-server postgresql94-devel postgresql94
yum groupinstall -y 'Development Tools'
yum install -y sqlite-devel libxslt-devel libxml2-devel java-1.7.0-openjdk libpcap-devel nano openssl-devel zlib-devel libffi-devel gdbm-devel readline-devel nano wget git
gem install wirble pg sqlite3 msgpack activerecord redcarpet rspec simplecov yard bundler
tar zxvf yaml-0.1.6.tar.gz
cd yaml-0.1.6
./configure --prefix=/usr/local/
make
make install
tar zxvf ruby-2.2.4.tar.gz
cd ruby-2.2.4
./configure --prefix=/usr/local --with-opt-dir=/usr/local/lib
make
make install
tar jxvf nmap-7.12.tar.bz2
cd nmap-7.12
./configure
make
make install
exclude=postgresql*
service postgresql-9.4 initdb
service postgresql-9.4 start
chkconfig --level 35 postgresql-9.4 on
echo export PATH=/usr/pgsql-9.4/bin:$PATH >> /etc/bashrc
source ~/.bashrc
su - postgres
su - postgres
-bash-4.1$ createuser msf -P -S -R -D
Enter password for new role:
Enter it again:
createdb -O msf msf
exit
cp /var/lib/pgsql/9.4/data/pg_hba.conf /var/lib/pgsql/9.4/data/pg_hba.conf.bak
vim /var/lib/pgsql/9.4/data/pg_hba.conf
77 # TYPE DATABASE USER ADDRESS METHOD
78
79 # "local" is for Unix domain socket connections only
80 local all all md5
81 # IPv4 local connections:
82 host all all 127.0.0.1/32 md5
83 # IPv6 local connections:
84 host all all ::1/128 md5
85 # Allow replication connections from localhost,by a user with thed
86 # replication privilege.
87 #local replication postgres peer
88 #host replication postgres 127.0.0.1/32 ident
89 #host replication postgres ::1/128 ident
service postgresql-9.4 restart
cd /opt/
git clone https://github.com/rapid7/Metasploit-framework.git
cd Metasploit-framework
bash -c 'for MSF in $(ls msf*); do ln -s /opt/Metasploit-framework/$MSF /usr/local/bin/$MSF;done'
ln -s /opt/Metasploit-framework/armitage /usr/local/bin/armitage
bundle install
bundle install
Don't run Bundler as root. Bundler can ask for sudo if it is needed,and
installing your bundle as root will break this application for all non-root users
on this machine.
Fetching gem Metadata from https://rubygems.org/
Fetching version Metadata from https://rubygems.org/
Fetching dependency Metadata from https://rubygems.org/
Resolving dependencies....
Installing rake 11.2.2
Using i18n 0.7.0
Installing json 1.8.3 with native extensions
vim /opt/Metasploit-framework/database.yml
development: &pgsql
adapter: postgresql
database: Metasploit-credential_development1
username: msf
password:
host: localhost 修改为 127.0.0.1
port: 5432
pool: 5 修改为 75
timeout: 5
min_messages: warning
test:
<<: *pgsql
database: Metasploit-credential_test1
netstat -tuplna | grep 5432
tcp 0 0 127.0.0.1:5432 0.0.0.0:* LISTEN 30767/postmaster
tcp 0 0 ::1:5432 :::* LISTEN 30767/postmaster
echo export MSF_DATABASE_CONFIG=/opt/Metasploit-framework/database.yml >> /etc/bashrc
source ~/.bashrc
验证
msfconsole