Book Image

Mastering Metasploit - Third Edition

By : Nipun Jaswal
Book Image

Mastering Metasploit - Third Edition

By: Nipun Jaswal

Overview of this book

We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit. In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.
Table of Contents (14 chapters)

Harvesting files from target systems

Using file sweeping capabilities in Metasploit is effortless. The enum_files post exploitation module helps to automate file collection services. Let's see how we can use it:

We can see that we used the enum_files post-exploitation module. We used FILE_GLOBS as *.docx OR *.pdf OR *.xlsx, which means that the search will occur on these three types of file formats. Next, we just set the session ID to 5, which is nothing but our session identifier. We can see that as soon as we ran the module, it collected all the files found during the search and downloaded them automatically.