Ticker

6/recent/ticker-posts

Ad Code

Responsive Advertisement

Metasploit Review, Installation & Use plus The Best Alternatives

Metasploit Review and Alternatives

Metasploit is a handy tool and is one of the critical systems used by hackers – including the white hat hacker who performs penetration testing. There are two versions of Metasploit. These are Metasploit Framework and Metasploit Pro

Penetration testers can use Metasploit to gather information on a system, look for its security weaknesses, and then launch an attack to test whether real hackers could get into the system.

The history of Metasploit

Metasploit was first created in 2003 by H D Moore. It was made into an open-source project. Open-source systems make the source code of the software available to everyone. The main package is kept in storage, but those who copy it can change it and use it for free. Others can just use it for free. Some of the people who make changes send their new version back to the core project manager. A committee assesses the changes and, in many cases, brings them into the core system. Thus, members of the public end up becoming unpaid developers for the project.

The problem with many open source projects is that they lack the funds to manage the system properly. As a result, the software can get attacked by hackers who discover exploits. A software house will quickly produce an update in those events, but unfunded projects can’t organize a quick response, and thus, open-source systems rapidly become unusable.

Metasploit avoided being abandoned as outdated and insecure software by being adopted by the cybersecurity firm, Rapid7. The match between Metasploit and Rapid7 is a good one. The company is a leading innovator in the cybersecurity field.

Metasploit Framework

Since Rapid7 got involved with the Metasploit Project in 2009, the development of the tool has benefited from the professional project management experience of the software developer and, of course, money.

The original Metasploit became known as Metasploit Framework, and Rapid7 got the right to produce its own higher version of the tool. Metasploit Framework is still community-developed, still open source, and still free to use.

Metasploit Pro

Metasploit Pro is the Rapid7 version of Metasploit. The company takes the test version of Metasploit Framework, tests it for stability, and then adds its features. Thus, while Metasploit Framework is constantly updated, Metasploit Pro has a slower cycle of versions and includes more capabilities.

Metasploit Framework vs Metasploit Pro

Although Metasploit Framework is free, it doesn’t have many features. This works well for Rapid7 because the free version of Metasploit can act as a gateway to Metasploit Pro adoption. Here is a table showing the characteristics of each edition.

Feature Pro Framework
De-facto standard for penetration testing with more than 1,500 exploits Yes Yes
Import of network data scan Yes Yes
Network discovery Yes
Basic exploitation Yes
MetaModules for discrete tasks such as network segmentation testing Yes
Integrations via Remote API Yes
Simple web interface Yes
Smart Exploitation Yes
Automated credentials brute forcing Yes
Baseline penetration testing reports Yes
Wizards for standard baseline audits Yes
Task chains for automated custom workflows Yes
Closed-Loop vulnerability validation to prioritize remediation Yes
Basic command-line interface Yes
Manual exploitation Yes
Manual credentials brute forcing Yes
Dynamic payloads to evade leading anti-virus solutions Yes
Phishing awareness management and spear phishing Yes
Web app testing for OWASP Top 10 vulnerabilities Yes
Choice of advance command-line (Pro Console) and web interface Yes

As you can see from the features comparison, Metasploit Framework includes the same automated vulnerability scanner as Metasploit Pro but not much other automation.

Metasploit operating system compatibility

Metasploit requires 64-bit processors with the following operating systems:

  • Microsoft Windows: 7 SP1+, 8.1, 10
  • Windows Server: 208 R2, 2012 R2, 2016, 2019
  • Linux: RHEL 5.10 or later, Ubuntu 14.04 LTS or later

The download page for Metasploit Framework includes instructions for downloading to macOS and also includes CentOS, Fedora, and Debian Linux. However, these operating systems are not mentioned on the Systems Requirements page of the Metasploit section of the Rapid7 website.

Metasploit Framework is pre-installed on all versions of Kali Linux.

How to install Metasploit Framework

To get to know Metasploit Framework, you should download it and install it. The installation on Linux and macOS is straightforward, but the process is difficult on Windows.

If you are running Windows, turn off Windows Security first because otherwise, it will go crazy during the installation of Metasploit and block all of the threat files that it wants to copy onto the computer.

  1. Open File Explorer and create the directory c:\metasploit-framework.
  2. Open the Start menu.
  3. Click on the Settings cog.
  4. Select Update and Security.
  5. In the Update and Security windows, Click on Windows Security in the left-hand menu.
  6. Click on Virus & threat protection.
  7. Click on Manage settings.
  8. Slide the Real-time protection switch to Off.
  9. Scroll down to the Exclusions heading and click on Add or remove exclusions.
  10. Click on the Add an exclusion button and select Folder in the dropdown list. A Select Folder window will appear.
  11. Enter c:\metasploit-framework in the folder name field and press the Select Folder button.

You can now install Metasploit.

  1. Go to the download page for Metasploit Framework.
  2. Click on the link for the installer for your operating system.
  3. Click on the downloaded
  4. file to run the installer.
  5. Accept the End-User Licensing Agreement and cycle through the Installation Wizard by pressing the Next button on each screen.
  6. Press the Install button and wait for the progress bar to fill up.
  7. If you are installing Windows, during the installation process, a User Account Control pop-up will appear. Press Yes.

Wait for the installer to complete and then access the Metasploit Console.

How to install Metasploit Pro

Metasploit Framework and Metasploit Pro don’t install to the same directory, so it is possible to run both. This is mainly a good idea if you want to have the option of manually performing a brute force attack – a utility that isn’t included in Metasploit Pro.

You can access a 14-day free trial of Metasploit Pro. Go to the Metasploit Pro download page and fill out the form for the free trial.

14-day free trial of Metasploit Pro

The email address you enter must be on a company domain and not one of the free email systems, such as yahoo.com or mail.com. However, it needs to be a valid email address to which you have access because the Metasploit system sends an activation code to that account, and Metasploit Pro won’t work without it.

Before downloading the installer, crate the directory c:\metasploit. Go through the anti-virus disabling steps shown above if you are installing on Windows. Then, add in an exclusion for c:\metasploit. You will have less trouble installing on Linux. However, if you have an anti-virus system, you need to set up Metasploit as an exception to prevent your AV from blocking the installation.

Follow these steps after adjusting your AV:

  1. Click on the download link for your operating system on the page that follows the free trial form. This link is written as 64-Bit.
  2. Click on the downloaded file to run the installer.
  3. Accept the License Agreement.
  4. Cycle through the installer steps by clicking on the Next button.
  5. Note down the SSL port that you select for Metasploit activity. The default that is shown in the installation wizard is 3790.
  6. At the end of the installation process, press the Finish button. The application will open in a browser, and your system will present an option in which you select your preferred browser.

Using Metasploit Pro

The first time that you run Metasploit Pro, you will need to use the Metasploit Web UI. When this opens, you can set up an account for yourself.

Metasploit Web UI

The first account that you create is the Administrator account. You need to ensure that you choose a strong password because if a hacker ever got into this account, they could cause havoc on your entire system. The password must be a mix of letters and numbers and should include at least one unique character. It should not have the username that you are setting up and should not be easy to guess.

Next, look at the Inbox for the email address you gave when applying for the free trial. Copy the Product Key shown in the email and paste this into the screen that appears after entering the account details.

You can now use the Metasploit system through the Web interface.

Metasploit system through the Web interface

If you want to use Metasploit at the command line, go to the Start menu and look for the Metasploit menu item. Then, expand that and click on Metasploit Console.

The Metasploit Console is, basically, just a Command Prompt/Terminal window. Once you open up the window, the Metasploit system takes a long time to start up.

Metasploit system start up

Types exit at the prompt to close down the Metasploit Console.

Metasploit Console

If you opt for the Metasploit Framework, you just get the Console version.

How much does Metasploit Pro cost?

Rapid7 sells Metasploit Pro through distributors. Those businesses make their own decisions on the sales price, deciding how far they want to squeeze their margins to win business from rival software retailers.

The current price for Metasploit Pro is around $15,000 per year. The package price ranges from $14,267.99 to $15,329.99.

Alternatives to Metasploit

The option of both a free version and a fully-armed paid version gives Metasploit a broad appeal. The alternatives to Metasploit need to include both free utilities that compete with Metasploit Framework and paid systems that present Metasploit Pro alternatives. It is also helpful to consider vulnerability scanners, which can provide excellent alternative strategies to identifying system weaknesses.

Here is our list of the six best Metasploit alternatives:

  1. Netsparker (ACCESS FREE DEMO) This web vulnerability scanner is particularly useful for development testing and it is able to identify weaknesses in any APIs that the project might intend to use. In addition to looking for known vulnerabilities, this scanner uses its own process of heuristics that can spot weak security in modules and recommend fixes to tighten up any potential exploits. Offered as a SaaS platform or for installation on Windows and Windows Server.
  2. Acunetix (ACCESS FREE DEMO) This is a vulnerability scanner. The system is offered in three editions, and the lowest plan, called Standard, provides on-demand vulnerability scans that search for more than 7,000 vulnerabilities. The middle package, called Professional, includes a network scanner that can spot more than 50,000 known exploits. The external scanner will look at the internet-facing profile of a network and scan through websites and Web applications. In addition, it can monitor the operations of APIs and assess the security weaknesses of the modules that support them. Acunetix is provided as a hosted SaaS platform. However, it is also possible to download the software package and install it on Windows, macOS, or Linux.
  3. Armitage This package is not so much an alternative to Metasploit; this free tool enhances Metasploit Framework and makes it a better rival to Metasploit Pro. Armitage works as a front end to Metasploit Framework. It enables the user to use Metasploit to probe systems, gathering information, and identifying possible entry points. It stores the findings of research and feeds them into attack strategies. This tool is available for Windows, macOS, and Linux. It is pre-loaded into Kali Linux.
  4. Burp Suite Finally, this package from PortSwigger, is a very close match to Metasploit because it is available in a free Community Edition and a paid version, called the Professional Edition. There is also an Enterprise Edition, which is a fully automated vulnerability scanner. Both the free and paid versions have the same interface. However, many of the functions within that app are disable for Community Edition users. Those paid-for services include automated vulnerability scans. A significant benefit of the Burp Suite interface is that the user can select data from the research utility and get it sent directly into the attack services. Burp Suite runs on Windows, macOS, and Linux. You can download the Community edition for free or request a free trial of the Professional edition.
  5. Sqlmap This command-line utility offers just one command, but it has hundreds of options, which changes the function that gets run. This utility documents database and also launch attacks. The service includes valuable processes, such as password cracking and injection attacks. Some of the episodes can be conducted without leaving any trace, while others are intended to alter data in the database under attack. Sqlmap is free to use and installs on Windows, macOS, and Linux.
  6. Ettercap This packet capture utility is also an attack facility because it can inject traffic into a stream. This is a command-line utility that has an extensive library of commands. The attacks of this utility are based on the man-in-the-middle strategy. Its methods rely on the utility being run from within a network. The Ettercap package offers a user interface. However, like the Metasploit Console, this is just a customized Command Prompt/Terminal window. Ettercap can also be used for password capture, DNS spoofing, and Denial of Service. This utility is free to use and runs on Linux, Unix, Mac OS X, Windows 7, and 8. Unfortunately, it will not work on macOS or Windows 10.

L’article Metasploit Review, Installation & Use plus The Best Alternatives est apparu en premier sur Comparitech.

Enregistrer un commentaire

0 Commentaires