I'm not big into history lessons, but this one is important. The Metasploit Framework is a vulnerability management solution created by HD Moore and released in October 2003 with a total of 11 exploits. Today this software offers more than 1,400 exploits at the time of this writing.
Metasploit's main purpose is to test a network to find systems with vulnerabilities which can be used for both legitimate and unauthorized activities. Vulnerabilities can be used to take over a computer, upload/download files, open/close programs, take screenshots of the user's desktop, log everything they type, download a password database, turn on and stream their webcam and/or microphone to your computer, disable anti-virus software... this list can literally just keep going on and on, but I think you get the point: This is powerful shit we're working with.
Because of how powerful this program is, this is going to be Part 1 of a LARGE multi-part series on everything we can do with this software. So let's start with the check list.
What You Will Need
- Kali Linux (either a bootable LiveCD or bootable USB image)
- Internet connection
- Metasploit Framework (included in Kali Linux and available for Windows)
Setting Up The Metasploit Database
No actual hacking or system penetration will be performed during this tutorial, but it's essential you setup your database before moving to the subsequent parts. This may sound hard, but it's not if you follow these few simple steps.
Now, let's get to the hack: