Description: In this video I will show you how to perform post exploitation on a Linux system using Metasploit Framework.
So, In Metasploit there is 9-10 modules available for Linux post exploitation all modules are working very well. I thing this modules are best for Post – Exploitation on Linux very easy to use and effective.
Modules are used ..
http://www.metasploit.com/modules/post/linux/gather/hashdump
Post Module to dump the password hashes for all users on a Linux System
http://www.metasploit.com/modules/post/linux/gather/checkvm
This module attempts to determine whether the system is running inside of a virtual environment and if so, which one. This module supports detection of Hyper-V, VMWare, VirtualBox, Xen, and QEMU/KVM.
http://www.metasploit.com/modules/post/linux/gather/enum_configs
This module collects configuration files found on commonly installed applications and services, such as Apache, MySQL, Samba, Sendmail, etc. If a config file is found in its default path, the module will assume that is the file we want.
http://www.metasploit.com/modules/post/linux/gather/enum_network
This module gathers network information from the target system IPTables rules, interfaces, wireless information, open and listening ports, active network connections, DNS information and SSH information.
http://www.metasploit.com/modules/post/linux/gather/enum_protections
This module tries to find certain installed applications that can be used to prevent, or detect our attacks, which is done by locating certain binary locations, and see if they are indeed executables. For example, if we are able to run 'snort' as a command, we assume it's one of the files we are looking for. This module is meant to cover various antivirus, rootkits, IDS/IPS, firewalls, and other software.
http://www.metasploit.com/modules/post/linux/gather/enum_system
This module gathers system information. We collect installed packages, installed services, mount information, user list, user bash history and cron jobs
http://www.metasploit.com/modules/post/linux/gather/enum_users_history
This module gathers user specific information. User list, bash history, mysql history, vim history, lastlog and sudoers.
Source : - http://www.metasploit.com
PDF : - http://www.mediafire.com/view/?ofvg2px873s9fo5
Tags: post-exploitation , hacking , hack ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.