Page 1 of 2 12 LastLast
Results 1 to 10 of 12

Thread: metasploit question

  1. #1
    Just burned his ISO
    Join Date
    Apr 2009
    Location
    MA
    Posts
    7

    Default metasploit question

    is metasploit effective when trying to exploit through the web? ive notice it just times out and fails.........if it is not effective, what is?

  2. #2
    Member
    Join Date
    Jan 2010
    Posts
    332

    Default

    Quote Originally Posted by DtL666 View Post
    is metasploit effective when trying to exploit through the web? ive notice it just times out and fails.........if it is not effective, what is?
    It would be a lot better if you search for yourself than asking questions every time you fail at something. At least give it a decent try. All of these questions have been asked and answered. Yes it can be done remotely. Your problem here is basic understanding of TCP/IP networking. Read up on it and port forwarding (on the receiving end).
    SecurityTube has two new sections. Questions & News

  3. #3
    Just burned his ISO
    Join Date
    Apr 2009
    Location
    MA
    Posts
    7

    Default

    dude....this is my second post ever. thanks for the tips but you don't have to be inconsiderate. i started doing this recently and have had no help.

  4. #4
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    Quote Originally Posted by DtL666 View Post
    dude....this is my second post ever. thanks for the tips but you don't have to be inconsiderate. i started doing this recently and have had no help.
    Well this is not the place to be a beginner. Call me a a$$hole but its true. We encourage you to learn some fundamentals and then come on back and be part of a great community.

  5. #5
    Member
    Join Date
    Jan 2010
    Posts
    332

    Default

    I'm not trying to be inconsiderate. That was a tip also. If you've read the forum rules you would know that there are some standards this community is built on. One of them is being determined and willing to learn for yourself (can be accomplished by properly searching the forums).
    SecurityTube has two new sections. Questions & News

  6. #6
    Just burned his ISO
    Join Date
    Apr 2009
    Location
    MA
    Posts
    7

    Default

    thats cool....but don't make a newbie section and expect people to not ask questions. i wouldn't have asked if i knew i was going to get ripped on. great community

  7. #7
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default

    Quote Originally Posted by DtL666 View Post
    thats cool....but don't make a newbie section and expect people to not ask questions. i wouldn't have asked if i knew i was going to get ripped on. great community
    Posted at the top of this page and every single one in the Newbie Area:

    Newbie Area Welcome to the BackTrack Forums! Please check this section and post to it if you are new to BackTrack, the Forums, or both.

    But no where does it say anything about metasploiting the inturwebs.

    And no one ripped on you, you were encouraged to take the appropriate action and to search and learn.
    To be successful here you should read all of the following.
    ForumRules
    ForumFAQ
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

  8. #8
    Member kazalku's Avatar
    Join Date
    Feb 2009
    Posts
    416

    Lightbulb

    May be it's the time to introduce a little quiz BEFORE someone can register here. I'm serious & not kidding at all. I'm sure that we can setup 5 simple questions to welcome new members to the community. Just for example:

    1) Which of the following is best option if you have any question?
    • A) Ask mum
      B) Ask Dad
      C) Post it to forum
      D) Google


    2) Which of the following is most powerful encryption?
    • A) WEP
      B) Open
      C) WPA
      D) Switching off your computer




    Well...... something like these....
    If you can't explain it simply, you don't understand it well enough -- Albert Einstein

  9. #9
    Junior Member
    Join Date
    Jul 2009
    Posts
    52

    Default

    ....derailment in progress....

    @dtl666 you aren't on tekroscape are you?


    I was tempted to suggest an easter egg hunt through Google.

    But then I thought.. why not an essay based upon the Stickies

    Quote Originally Posted by archangel.amael
    Newbie Area Welcome to the BackTrack Forums! Please check this section and post to it if you are new to BackTrack, the Forums, or both.

    But no where does it say anything about metasploiting the inturwebs.
    Nor does it state How to use Linux for people bred on Windows or Macs. That is something that is rather annoying as well.

    Quote Originally Posted by pureh@te
    "Call me an a$$hole..."
    Brilliant!

    ....end of derailment....

    JT

  10. #10
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default

    Quote Originally Posted by DtL666 View Post
    thats cool....but don't make a newbie section and expect people to not ask questions. i wouldn't have asked if i knew i was going to get ripped on. great community
    We actually do expect questions, we just prefer it when the question contains some detail, is clearly written, doesn't misuse terminology and is phrased in a way that actually allows us to give a meaningful answer.

    Your question was none of these things, and without follow up information it will be impossible for anyone to answer your question in a way that is of any use to you at all.

    Let me demonstrate by going back to your original question....

    Quote Originally Posted by DtL666 View Post
    is metasploit effective when trying to exploit through the web?
    Yes....

    Although this is dependent on:
    • whether you are using Metasploit correctly,
    • which exploit you are using,
    • what your ultimate goal of exploitation is (what you want to do to the target system),
    • whether you are using client or server side web exploits,
    • whether vulnerable software exists on the target system,
    • whether other protection methods are in place between you and the target (firewall, IPS, etc)
    • and whether you actually meant "Internet" instead of "Web".


    Quote Originally Posted by DtL666 View Post
    ive notice it just times out and fails
    I see.

    I cant even hazard a guess as to why this is happening until I know what command you used, what system you are targeting, what patches and software are installed on the target system, what error messages you got, whether a firewall is in place between the Metasploit system and the target system, etc, etc

    Quote Originally Posted by DtL666 View Post
    .........if it is not effective, what is?
    Many other packages could be effective. Depending on what you are trying to achieve of course.... which is what again?

    So was that answer helpful?

    Maybe instead of complaining about how badly you are being treated here, you should put some more effort into asking questions that can actually be answered, and into reading up about the subject you are supposedly so interested in so you can understand those answers when they get provided to you.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •