Nytro Posted December 27, 2012 Report Posted December 27, 2012 Linux Post - Exploitation Using Metasploit Framework Description: In this video I will show you how to perform post exploitation on a Linux system using Metasploit Framework.So, In Metasploit there is 9-10 modules available for Linux post exploitation all modules are working very well. I thing this modules are best for Post – Exploitation on Linux very easy to use and effective.Modules are used ..Linux Gather Dump Password Hashes for Linux Systems | Metasploit Exploit Database (DB)Post Module to dump the password hashes for all users on a Linux SystemLinux Gather Virtual Environment Detection | Metasploit Exploit Database (DB)This module attempts to determine whether the system is running inside of a virtual environment and if so, which one. This module supports detection of Hyper-V, VMWare, VirtualBox, Xen, and QEMU/KVM.Linux Gather Configurations | Metasploit Exploit Database (DB)This module collects configuration files found on commonly installed applications and services, such as Apache, MySQL, Samba, Sendmail, etc. If a config file is found in its default path, the module will assume that is the file we want.Linux Gather Network Information | Metasploit Exploit Database (DB)This module gathers network information from the target system IPTables rules, interfaces, wireless information, open and listening ports, active network connections, DNS information and SSH information.Linux Gather Protection Enumeration | Metasploit Exploit Database (DB)This module tries to find certain installed applications that can be used to prevent, or detect our attacks, which is done by locating certain binary locations, and see if they are indeed executables. For example, if we are able to run 'snort' as a command, we assume it's one of the files we are looking for. This module is meant to cover various antivirus, rootkits, IDS/IPS, firewalls, and other software.Linux Gather System and User Information | Metasploit Exploit Database (DB)This module gathers system information. We collect installed packages, installed services, mount information, user list, user bash history and cron jobsLinux Gather User History | Metasploit Exploit Database (DB)This module gathers user specific information. User list, bash history, mysql history, vim history, lastlog and sudoers.Source : - Penetration Testing Software | MetasploitPDF : - Linux Post Exploitation.pdf Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Tags: post-exploitation , hacking , hack , Sursa: Linux Post - Exploitation Using Metasploit Framework Quote