Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
it TP

it TP

Ratings: (0)|Views: 35 |Likes:
Published by api-3745308

More info:

Published by: api-3745308 on Oct 18, 2008
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Copyright 2004 All Rights Reserved
Metasploit Framework
Version One
December 14, 2004
Copyright 2004 All Rights Reserved
Laboratory Overview

At the end of this lab students will be able to setup and utilize
the Metasploit Framework for writing, testing, and using exploit

Information for Laboratory
A. Students will install the Metasploit Framework in a Windows
B. Students will select an exploit, configure options, select the
payload and select a target system.
C. Students will launch the exploit and if successful, be provided
with a command line on the exploited system.
Student Preparation

The student will have completed requisite reading. The student
will require paper for notes and should be prepared to discuss
the exercises upon completion. Students should also have a
basic understanding of the command line in a Windows

Instructor Preparation

Before class, the instructor or a lab assistant will ensure that a
requisite Windows operating system (NT 4.0, 2000, XP, or
2003) is installed on the student computers. Optionally, the
students could have access to a vulnerable (un-patched)
computer in the lab. If this method is used, ensure that the
student knows the IP address of the target machine for Step 4
below. The instructor or lab assistant should also ensure that
the latest version of Metasploit is available for students. This
may be found at

Copyright 2004 All Rights Reserved

Ideally, this lab should be performed with computers in a classroom
on their own switch, as not to disrupt a normal operating network.
Students should attempt to \u201cdo no harm\u201d to their targets, only test
them for vulnerabilities.

Estimated Completion Time
45 Minutes
Metasploit Framework

The Metasploit Framework is an environment utilized to write, test,
and execute exploit code. It was developed to provide penetration
testing on subject computers, as well as vulnerability research.
Several new exploit modules have been developed since the release
of version 2.2, and are available for download from the Metasploit
site. For penetration testers, Metasploit is proving to be an invaluable
tool. The framework is provided completely free of charge to users.
The framework has been tested stable with four primary platforms;
Linux, BSD, MacOS X, and Windows NT. A \u201cUser\u2019s Guide\u201d is also
available from the Metasploit site.

Step 1: Installing the Metasploit Framework

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->