Now I have got into vulnerability testing tools from the users’ perspective! This week I set up a Metasploitable machine, to use Metasploit from my Kali VM to scan for vulnerabilities and generate tool output. It’s very cool to see how Metasploit had writeups on the individual vulnerabilities and procedures to exploit them right from the command line.
Even cooler was Nexpose. Again I got a solid overview of the sort of vulnerabilities found and how they could be exploited. By referring to material outside the Metasploit Community, it feels very connected to the wider InfoSec world out on the internet. The automatic report generation and automated scans were also handy features.
I have been working on some improvements to the base Dradis CE application this week as well, so this tied in neatly with the studies. I have only just started with tool output generation, and already I’m manipulating data from Metasploit, Nexpose, and Nmap, all of which are supported in Dradis. Now that I’m getting the actual user’s view of tool usage I can better put myself in the shoes of hackers starting out with Dradis for the first time to generate customised reports using data from multiple sources.
Having spent so much time with Dradis Pro, it’s fun to get back to basics with Dradis CE. I’m not bothered by not having access to Word templates. I gave up using Windows years ago, even my Steam library wasn’t worth the hassle of dealing with it – and I think there’s a lot of potential in well-made HTML templates. For my purposes, learning and experimenting at home, and showing off to the people at the sailing club bar, it’s a good tool to play with; scan with all the tools and plug all the results into a simple collated report.
Next up in the course is client-side attacks; technical exploits as well as the social engineering exploits of the PEBKAC vulnerabilities!