C&C server Listener server - sofwerx/MalwareLab GitHub Wiki

Metasploit Setup

This is the host that will be you will br running Metasploit from. For our purposes it can be a computer on the local network and it must be able to communicate with other computers on the local network. For installing Metaslpoit I will be providing a general outline of the steps to take to install it. However, there could be some distro specific steps and in that case you will be on your own.

NOTE: Some package managers will automatically set all of this up. In the case you are lucky expect, the postgesql server.

  1. Install Ruby and Ruby bundler.
  2. Install and setup Postgresql server.
  3. Clone the Metasploit off of rapid 7 github. Cloning it off the github allows you to get the latest version of git clone https://github.com/rapid7/metasploit-framework.git
  4. Change directories into metasploit and run ./msfconsole. If everything is configured correctly you should be able to start it.

Cavetts

A couple things I learned about Metasploit when messing around with it

  1. Need to run msfconsole as root to bind handler to a port. However, if you run msfconsle as root for the first time you will get an ruby gem error complaining it cant find any gems. In that case you will need to run bundle install with sudo. Ruby will complain that running bundler in root with only allow root to access gems but, other then that you will be fine.

  2. Sometimes your firewall can block your successful exploit or reverse shell connection to your computer.