当前位置: > CentOS > CentOS教程 >

centos6 安装 Metasploit

时间:2016-08-27 10:23来源:linux.it.net.cn 作者:IT

Metasploit是一个免费的、可下载的框架,通过它可以很容易地获取、开发并对计算机软件漏洞实施攻击。它本身附带数百个已知软件漏洞的专业级漏洞攻击工具。当H.D. Moore在2003年发布Metasploit时,计算机安全状况也被永久性地改变了。仿佛一夜之间,任何人都可以成为黑客,每个人都可以使用攻击工具来攻击那些未打过补丁或者刚刚打过补丁的漏洞。软件厂商再也不能推迟发布针对已公布漏洞的补丁了,这是因为Metasploit团队一直都在努力开发各种攻击工具,并将它们贡献给所有Metasploit用户。

 

实验环境

centos6.5_x64

 

实验软件

pgdg-centos94-9.4-1.noarch.rpm

yaml-0.1.6.tar.gz

ruby-2.2.4.tar.gz

nmap-7.12.tar.bz2

metasploit-framework.git

 

软件安装

rpm -ivh pgdg-centos94-9.4-1.noarch.rpm 

yum install -y postgresql94-server postgresql94-devel postgresql94

yum groupinstall -y 'Development Tools'

yum install -y  sqlite-devel libxslt-devel libxml2-devel java-1.7.0-openjdk libpcap-devel nano openssl-devel zlib-devel libffi-devel gdbm-devel readline-devel nano wget git 

gem install wirble pg sqlite3 msgpack activerecord redcarpet rspec simplecov yard bundler

 

 

tar zxvf yaml-0.1.6.tar.gz

cd yaml-0.1.6

./configure --prefix=/usr/local/

make

make install 

 

tar zxvf ruby-2.2.4.tar.gz 

cd ruby-2.2.4

./configure --prefix=/usr/local --with-opt-dir=/usr/local/lib

make

make install

 

tar jxvf nmap-7.12.tar.bz2 

cd nmap-7.12

./configure

make

make install

 

exclude=postgresql*

service postgresql-9.4 initdb

service postgresql-9.4 start

chkconfig --level 35 postgresql-9.4  on

echo export PATH=/usr/pgsql-9.4/bin:$PATH >> /etc/bashrc 

source ~/.bashrc

su - postgres

su - postgres

-bash-4.1$ createuser msf -P -S -R -D 

Enter password for new role: 

Enter it again: 

 

createdb -O msf msf

exit

 

cp /var/lib/pgsql/9.4/data/pg_hba.conf   /var/lib/pgsql/9.4/data/pg_hba.conf.bak

vim /var/lib/pgsql/9.4/data/pg_hba.conf 

 

 

 77 # TYPE  DATABASE        USER            ADDRESS                 METHOD

 78 

 79 # "local" is for Unix domain socket connections only

 80 local   all             all                                     md5

 81 # IPv4 local connections:

 82 host    all             all             127.0.0.1/32            md5

 83 # IPv6 local connections:

 84 host    all             all             ::1/128                 md5

 85 # Allow replication connections from localhost, by a user with thed

 86 # replication privilege.

 87 #local   replication     postgres                                peer

 88 #host    replication     postgres        127.0.0.1/32            ident

 89 #host    replication     postgres        ::1/128                 ident

 

service postgresql-9.4 restart

cd /opt/

git  clone https://github.com/rapid7/metasploit-framework.git

cd metasploit-framework

bash -c 'for MSF in $(ls msf*); do ln -s /opt/metasploit-framework/$MSF /usr/local/bin/$MSF;done'

ln -s /opt/metasploit-framework/armitage /usr/local/bin/armitage

bundle install

bundle install

Don't run Bundler as root. Bundler can ask for sudo if it is needed, and

installing your bundle as root will break this application for all non-root users

on this machine.

Fetching gem metadata from https://rubygems.org/

Fetching version metadata from https://rubygems.org/

Fetching dependency metadata from https://rubygems.org/

Resolving dependencies....

Installing rake 11.2.2

Using i18n 0.7.0

Installing json 1.8.3 with native extensions

 

vim /opt/metasploit-framework/database.yml

 

development: &pgsql

  adapter: postgresql

  database: metasploit-credential_development1

  username: msf

  password: 

  host: localhost  修改为 127.0.0.1

  port: 5432    

  pool: 5          修改为 75

  timeout: 5

  min_messages: warning

  test:

  <<: *pgsql

 database: metasploit-credential_test1

 

netstat -tuplna | grep 5432

tcp        0      0 127.0.0.1:5432              0.0.0.0:*                   LISTEN      30767/postmaster    

tcp        0      0 ::1:5432                    :::*                        LISTEN      30767/postmaster    

 

echo export MSF_DATABASE_CONFIG=/opt/metasploit-framework/database.yml >> /etc/bashrc 

source ~/.bashrc

 

验证

msfconsole



(责任编辑:IT)
------分隔线----------------------------
栏目列表
推荐内容