LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-13-2011, 09:01 AM   #1
linux_alain
Member
 
Registered: Jan 2011
Location: UAE
Distribution: BackTrack, Ubuntu, Red Hat
Posts: 30

Rep: Reputation: 0
Post BackTrack for web vulnerability Assessment


Hello there,

I i've virtual machine that is running BackTrack4r2. I need to use the built-in tool Metaspolit in bt for assessing the security and vulnerability in websites

The prob is that i dont have any idea about the Metaspolit tool

I would appreciate any help in providing info about best senario to use to demo the functionality of this tool or any info about it

Thanks so much for the support
 
Old 01-13-2011, 10:16 AM   #2
szboardstretcher
Senior Member
 
Registered: Aug 2006
Location: Detroit, MI
Distribution: GNU/Linux systemd
Posts: 4,278

Rep: Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694Reputation: 1694
Cool

Through the power of a magical internet tool, dubbed, "Yahoo Search Engine" I was able to find results for you.

http://search.yahoo.com/search?p=met...UTF-8&fr=moz35

 
Old 01-14-2011, 12:29 AM   #3
linux_alain
Member
 
Registered: Jan 2011
Location: UAE
Distribution: BackTrack, Ubuntu, Red Hat
Posts: 30

Original Poster
Rep: Reputation: 0
Dear szboardstretcher

thanks so much ,, i actually read some of those websites b4 posting here!!

i asked if it is possible to have some scenarios to demo the functionalities of the tool

thanks
 
Old 01-14-2011, 06:59 AM   #4
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 422Reputation: 422Reputation: 422Reputation: 422Reputation: 422
Instead of using metasploit, have you thought about other ways to tackle the problem?

- What is your monitoring solution so that if you get cracked you know about it?
- What is you update/patching routine?
- Have you investigated the sites you're hosting for known exploits?
- Do you have code audits/reviews for hosted sites?
- Are you responsible for updating the sites or are others? And if others, how are updates enforced?
- What steps have you taken to harden the hosting machine? SELinux? chroot? Virtual Machines?
- Do you have a disaster recovery plan and does it work?

In my opinion, penetration testing is really only useful in the context of an overall security plan where you've evaluated how to stop attacks in the first place. In fact I would argue you can be highly successful at maintaining a secured environment without ever having to resort to penetration testing.
 
Old 01-14-2011, 07:17 AM   #5
michaelk
Moderator
 
Registered: Aug 2002
Posts: 25,700

Rep: Reputation: 5895Reputation: 5895Reputation: 5895Reputation: 5895Reputation: 5895Reputation: 5895Reputation: 5895Reputation: 5895Reputation: 5895Reputation: 5895Reputation: 5895
Moved: This thread is more suitable in Linux-Security and has been moved accordingly to help your thread/question get the exposure it deserves.
 
Old 01-14-2011, 07:23 AM   #6
nomb
Member
 
Registered: Jan 2006
Distribution: Debian Testing
Posts: 675

Rep: Reputation: 58
Metasploit is a great tool for pen testing web apps. Anyone who says they want to learn metasploit I always suggest they go through the metasploit unleashed class put up by offensive-security. (it's free) Metasploit Unleashed

nomb
 
Old 01-15-2011, 07:57 AM   #7
linux_alain
Member
 
Registered: Jan 2011
Location: UAE
Distribution: BackTrack, Ubuntu, Red Hat
Posts: 30

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by nomb View Post
Metasploit is a great tool for pen testing web apps. Anyone who says they want to learn metasploit I always suggest they go through the metasploit unleashed class put up by offensive-security. (it's free) Metasploit Unleashed

nomb
dude that wat i was looking for exactly

thanks lots u've been great help
 
Old 01-15-2011, 11:59 AM   #8
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Vulnerability assessment and pen testing are two different things.

I recommend true vuln assessment tools such as Nikto or Nessus. Use those first, as they will show you any apparent holes to further exploit using pen test tools.
 
Old 01-19-2011, 10:16 AM   #9
nomb
Member
 
Registered: Jan 2006
Distribution: Debian Testing
Posts: 675

Rep: Reputation: 58
Quote:
Originally Posted by unixfool View Post
Vulnerability assessment and pen testing are two different things.

I recommend true vuln assessment tools such as Nikto or Nessus. Use those first, as they will show you any apparent holes to further exploit using pen test tools.
Yes they are. However he was directly asking about Metasploit regardless if he used the right terminology. But you are right and I do wish people would push the fact that there is a difference so thanks for that! Also, I really am starting to consider Metasploit more of an environment vs a tool. And the reason I say that is I can run Nikto, Nessus, DirBuster, etc all from within Metasploit via simple ruby / python scripts. Actually I think Nessus might be built-in now. IDK I use my own. I know neXpose is. Either way, while it has a great exploitation framework (which is what it is) that is one tool that I could agree could be considered an assessment tool as well.

nomb
 
Old 01-19-2011, 01:10 PM   #10
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
I think I answered fairly. Also, Hangdog42 was going in a similar direction as I was. Within the first two sentences of the OP's post, I saw that he he didn't mention that he wanted to pen test. He didn't mention pen testing in his whole post yet he mentioned backtrack and Metasploit.

My response was meant to inform the OP that pen testing is usually within the latter stages of assessing a system/service and that there is a definitive difference between looking for vulnerabilities, shoring up the findings, and exploiting known vulnerabilities. In most cases, a system can be secured without resorting to pen testing. Whether the OP accepts the advice is up to him, but it is upon every reader to add anything they think is relevant.

Also, don't let Metasploit's modular nature fool you into thinking that Nessus/Nikto and similar tools are actually developed by the maintainers of Metasploit. They are separate tools that can be leveraged by the Metasploit framework though usage of scripts. Linkage via scripts doesn't necessarily mean products are thoroughly integrated (or even supported by the Metasploit project).
 
Old 01-20-2011, 08:09 AM   #11
nomb
Member
 
Registered: Jan 2006
Distribution: Debian Testing
Posts: 675

Rep: Reputation: 58
I didn't say you didn't answer fairly and in fact I thanked you for bringing that up since it is often over looked...

Quote:
Originally Posted by unixfool View Post
Also, don't let Metasploit's modular nature fool you into thinking that Nessus/Nikto and similar tools are actually developed by the maintainers of Metasploit. They are separate tools that can be leveraged by the Metasploit framework though usage of scripts. Linkage via scripts doesn't necessarily mean products are thoroughly integrated (or even supported by the Metasploit project).
Yes I know I said I use my own scripts that I wrote.

nomb
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Open Vulnerability Assessment System LXer Syndicated Linux News 1 06-18-2009 08:34 AM
LXer: Open Vulnerability Assessment System LXer Syndicated Linux News 0 12-21-2008 01:20 PM
LXer: OpenVAS - Opensource Vulnerability Assessment Scanner LXer Syndicated Linux News 0 08-24-2008 09:40 PM
Printing Assessment pixellany Linux - Software 3 02-28-2007 08:03 AM
Application Assessment for Linux Migration MSquared Linux - Software 1 02-02-2005 05:14 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:22 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration