Tools and Utilities
Here we can find some tools and utilities commonly used for processes related to exploitation:
Exploit DB
A web repository that retains exploits for software and applications
Searchsploit
Kali package for accessing ExploitDB
Commands
Installation
sudo apt install exploitdbUsage
searchsploit $KeywordsMetasploit
An exploitation framework with tools for every phase of pen-testing
Modules
Auxiliary: Any supporting module
Encoders: Encode exploit and payload for bypassing signature-based antivirus
Evasion: For antivirus evasion
Exploits: Exploits, organized by target system
Nops: No Operation, CPU will do nothing for one cycle, often used as a buffer to achieve consistent payload sizes
Payloads: Different payloads that can open shells on the target system
Adapters: Convert single payloads into different forms
Single: Also called in-line, does not need to download an additional component to run.
Stagers: Set up a connection channel between Metasploit and the target system. First, the stager is uploaded on the target system, and then it downloads the rest of the payload (stage)
Stages: Downloaded by the stager, allowing the use of larger-sized payloads
Post: For post-exploitation
Common parameters
RHOSTS: IP address of the target system
RPORT: Port on the target system where the vulnerable application is running
PAYLOAD: Payload that will be used with the exploit
LHOST: Attacking machine (local) IP address
LPORT: Port (local) that will be used for the reverse shell to connect back to
SESSION: Session ID of the connection with Metasploit. Used with post-exploitation modules connected to the target system
Commands
Installation
Start the console
List modules
Search module
Usage
Common and useful scripts
Payloads for Everything
A repository that contains payloads for diverse purposes and attacks
Evil-WinRM
Tool to connect remotely to a Windows WinRM instance
Install
Access to WinRM
Last updated