Book Image

BackTrack 5 Cookbook

By : Willie L. Pritchett, David De Smet
Book Image

BackTrack 5 Cookbook

By: Willie L. Pritchett, David De Smet

Overview of this book

<p>BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm.<br /><br />"BackTrack 5 Cookbook" provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, priviledge escalation, and covering your tracks.<br /><br />The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.<br /><br />We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cracking, and BackTrack forensics.<br /><br />"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.</p>
Table of Contents (17 chapters)
BackTrack 5 Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Mastering the Metasploit Console (MSFCONSOLE)


In this recipe, we will examine the Metasploit Console (MSFCONSOLE). The MSFCONSOLE is primarily used to manage the Metasploit database, manage sessions, and configure and launch Metasploit modules. Essentially, for the purpose of exploitation, the MSFCONSOLE will get you connected to a host so that you can launch your exploits against it.

Some common commands that you will use when interacting with the console are:

  • help: This command will allow you to view the help file for the command you are trying to run

  • use modulename: This command allows you to begin configuring the module that you have chosen

  • set optionname modulename: This command allows you to set the various options for a given module

  • exploit: This command launches the exploit module

  • run: This command launches a non-exploit module

  • search modulename: This command allows you to search for an individual module

  • exit: This command allows you to exit the MSFCONSOLE

Getting ready

A connection...