Tools and Utilities
Here we can find some tools and utilities commonly used for processes related to exploitation:
Exploit DB
Web repository that retains exploits for software and applications
Searchsploit
Kali package for acceding to exploitDB
Commands
Installation
Usage
Metasploit
Exploitation framework with tools for every phase of pen-testing
Modules
Auxiliary: Any supporting module
Encoders: Encode exploit and payload for bypassing signature-based antivirus
Evasion: For antivirus evasion
Exploits: Exploits, organized by target system
Nops: No Operation, CPU will do nothing for one cycle, often used as a buffer to achieve consistent payload sizes
Payloads: Different payloads that can open shells on the target system
Adapters: Convert single payloads into different form
Single: Also called in-line, do not need to download an additional component to run.
Stagers: Set up a connection channel between Metasploit and the target system. First, the stager is uploaded on the target system and then it downloads the rest of the payload (stage)
Stages: Downloaded by the stager, allows to use larger-sized payloads
Post: For post-exploitation
Common parameters
RHOSTS: IP address of the target system
RPORT: Port on the target system the vulnerable application is running on
PAYLOAD: Payload that will be used with the exploit
LHOST: Attacking machine (local) IP address
LPORT: Port (local) that will be used for the reverse shell to connect back to
SESSION: Session ID of the connection with Metasploit. Used with post-exploitation modules connected to the target system
Commands
Installation
Start the console
List modules
Search module
Usage
Payloads for Everything
A repository that contains payloads for diverse purposes and attacks
LOLBAS
Contains scripts, binaries, and libraries for developing a Living Off the Land attack
Evil-WinRM
Tool to connect remotely to a Windows WinRM instance
Install
Access to WinRM
Last updated
Was this helpful?