Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.
Please ensure you are using the latest SD Card image which is available here.
Kali Linux is an operating system (OS) which can be used for ethical hacking and digital forensics. It is loaded with numerous tools, such as nmap and metasploit. Kali Linux also has a range of security tools and digital forensic applications that can be applied to many situations and currently is one of the most popular OS for cyber security specialists. The advantage of using Linux for most of these powerful tools is the ability to load onto any Linux version. There are other OS made for penetration testing such as Parrot OS and Black Arch but generally it is easier to access Kali Linux than these alternatives.
The Metasploit Project is an open source project that provides a public resource for researching security vulnerabilities and developing code that allows a network administrator to break into his own network to identify security risks and document which vulnerabilities need to be addressed first. The Metasploit Project offers penetration testing software and provides tools for automating the comparison of a program's vulnerability and its repaired (patched) version. Anti-forensic and advanced evasion tools are also offered, of which some of them are built into the Metasploit Framework.
Metasploit also offers a payload database, allowing the tester to mix and match exploit code and objectives. In 2009, the Metasploit Project was acquired by computer security company Rapid7. Metasploit Express and Metasploit Pro are open core versions of the Metasploit Framework, with more features added. (Open core is an approach to delivering products that combine open source and proprietary software.) Rapid7 continues to develop Metasploit in collaboration with the open source community.
Metasploit Framework, the Metasploit Project's best-known creation, is a software platform for developing, testing, and executing exploits. It can be used to create security testing tools and exploit modules and also as a penetration testing system. It was originally created as a portable network tool in 2003 by HD Moore. The Metasploit Project also offers Metasploit Express, Metasploit Pro, the Opcode Database (currently out of date) and a shellcode database. Shellcode is a type of exploit code in which bytecode is inserted to accomplish a particular objective. Common shellcode objectives include adding a rootkit or performing a reverse telnet back to the attacker's machine.
There are two popular types of shells: bind and reverse. A bind shell opens up a new service on the target machine and requires the attacker to connect to it in order to get a session. A reverse shell (also known as a connect-back) is the exact opposite: it requires the attacker to set up a listener first on his box, the target machine acts as a client connecting to that listener, and then finally the attacker receives the shell. The call back can be delivered in many different ways for instance in this project we are simulating a USB drop attack.
All of the payloads in Metasploit use Multi Handler. It is equipped to handle every single payload inside of Metasploit no matter what the architecture or type of connection being made. It knows how to deal with each type of payload because you tell it what to expect, but that doesn't take away from the fact that in this single utility lies the crucial stepping stone for all of Metasploit's exploitation.
The msfvenom tool is a component of the Metasploit Framework that allows users to generate a standalone version of any payload within the framework. Payloads can be generated in a variety of formats including executable, Ruby script, and raw shellcode. The msfvenom tool can also encode payloads to help avoid detection.
In this project the students will be learning about how metasploit works and a potential attack scenario.
Suggested Year Group
The suggested age group is 16+, due to the nature of this project and the skills it is developing.
Explain the basic principles of Metasploit;
Explain to the student how to create a payload using msfvenom;
Teach the students how an attack would work on Metasploit.
Component Number (Peli Case)
(Base) 4 + 5
(Level 1) 3
(Level 1) 3
(Level 1) 5
(Level 1) 1
Component Number (Box Case)
Raspberry Pi + Case
Kali Linux SD Card
Power Supply Unit
This project is designed to introduce the students to Metasploit and the applications this technology has in IT and cyber security. The students have used Metasploit on the Raspberry Pi to create and run payloads. Metasploit is an extremely powerful tool, and this tutorial is just the beginning on what you can do with it. Keep in mind that the Raspberry is limited in processing power and will not be able to handle large volumes of traffic accurately.