The answers to all those questions would fill up a book. Oh wait someone already did right here.
Ok well I am still new to back|track and getting used to all the tools. I just watched someones tutorial on just basic hacking. He use some tools that I was wondering about. I never really used metasploit before because I though it was mainly for destruction and thats not what I do. I think my idea's of what metasploit was are a little off, so could someone help me out. Basically what metaploit is is a big list of exploits that are regularly updated with exploits of gaining control of the target machine am I right? When you see Microsoft constaintly putting out new updates its because this program is exploited loop holes in common programs. Is metasploit used for other things that privilage escalation? How do you know what exploits to use on what machine? Thanks for the help.
Well I was just looking for some quick answers without having to pay $60. I found the answers to a few of my questions, but it was late last night and I was trying to get some sleep so thats why I posted here instead of looking in the first place. So at anytime please correct my thinking.
The way you find what exploit to attacking with all determines on what ports are open on the machine? I.e if there is a VNC port open then it would make sense to attack the VNC port.
I am not too sure on the payload methods, but I believe is personal preference or a kind of hit and miss thing, like if this doesn't work try this.
I'm not trying to be a jerk but there is no quick answers to your questions. If you have a specific question I would be happy to answer it.
I felt like bending the bars back, and ripping out the window frames and eating them. yes, eating them! Leaping, leaping, leaping! Colonics for everyone! All right! You dumb*sses. I'm a mental patient. I'm *supposed* to act out!
You're soo far ahead of yourself it isn't even funny. It's like you're trying to figure out how to do division without understanding addition, subtraction, and multiplication first.
There is a regular workflow (WF) for vulnerability assessments or penetration tests. First you need to learn about that. Then you need to realize that use of Metasploit comes in at step 3 of a 4 step process. (Yes the WF contains different #'s of phases/steps depending on the methodology. But 3 of 4 is sufficient for illustrating the point).
I'm a compulsive post editor, you might wanna wait until my post has been online for 5-10 mins before quoting it as it will likely change.
I know I seem harsh in some of my replies. SORRY! But if you're doing something illegal or posting something that seems to be obvious BS I'm going to call you on it.
I am just trying to get started and honestly I don't know were to being. I wasn't trying to make you out to be a jerk purehate...sorry if it came out that way.
Let me give you basic rundown of what im doing. I work for a company that has a nice sized network (about 150) computers/internet devices. I work right next to the guy who maintains the servers so I don't do anything with the network, but honestly he doesn't know what he is doing either. I am not trying destroy the network of the company I work for, but I though it would be a good place to start learning things. So let me break down the layout of the network. There are about 150 computers with switchs on a lot of them. I just started reading on ARP and packet capturing. I know all of the passwords for all the computers, but I am trying to get them other ways
So this is what I did, I hooked up my laptop to the network and fired up autoscan. I let autoscan run its course and it gave me all the open ports for all the computers. This is what the scan looks like.
Firewall - 11 IP's
Server - There is 2 workgroups: MSHOME, and WORK
Under WORK is Server1 and under MSHOME is 2 IP's
Unknown - 114 IP's
Workstation - WORK -> 18 computers
Workstation - MSHOME -> 1 computer
Workstation - WORKGROUP -> 1 pc name John (the guy who works next to me's PC)
So basically how we access certain server programs is by web address i.e. 192.168.1.1 and there is certain ones that say we can edit employees under one and we can change the channels of the TV's at our work on another.
So what is the next step I should take.
I am trying to learn this as a basic guide of what to do when I hook up to a new network. Thanks for the help!!
Here is the problem- It may shock you to know that people often misrepresent themselves on the internet. I for one am wary of someone who says they have access to a network of 100 computers but has no idea how to do simple scanning and OS discovery so at this point you should be reading up on the following topics
1. arp protocol
2. switched/hub networks
4. ports and what services use them
Please understand out position. I cant help it if you are trying to access a unauthorized network but I will feel better knowing I did not help.
Well I knew that would be an issue so I took steps in advance. Here is a picture of the room with the server, and me holding the access card to enter the room with the server.
I didn't even see a server but anyway it is next to impossible to tell you how to infiltrate a network with no info. Try a nmap scan
bt-#nmap -sS -sV -P0 192.168.1.1-255 ( or whatever your internal ip range is )
That should give you some stuff to reasearch. Thats it for my help