Metasploit一些操作
vpn设置
http://www.maxwithcoco.com/notes/vpn-pptp-in-backtrack-5

apt-get update
apt-get dist-upgrade
apt-get install network-manager-gnome network-manager-pptp
cp /etc/network/interfaces /etc/network/interfaces.bak
nano /etc/network/interfaces

删除文件中除了前两行之后的所有内容:

auto lo
iface lo inet loopback
service network-manager start
System >> Startup Applications >> Network Manager   &

重启,
 点击桌面右上角配置VPN,记得在Advanced >> Use Point-to-Point encryption (MPPE)

**********************************************************************************
[email protected]:~# apt-get update
[email protected]:/opt/metasploit# rm -rf msf3
[email protected]:/opt/metasploit# rm -rf msf3.zip

#git clone --depth=1 git://github.com/rapid7/metasploit-framework msf3
 git clone https://github.com/rapid7/metasploit-framework  msf3

修改文件:/opt/metasploit/ruby/lib/ruby/1.9.1/i686-linux/rbconfig.rb
  CONFIG["LIBRUBYARG_SHARED"] = "-Wl,-R -Wl,$(libdir) -L$(libdir) "
##CONFIG["LIBRUBYARG_STATIC"] = "-Wl,-R -Wl,$(libdir) -L$(libdir) -l$(RUBY_SO_NAME)-static"
  CONFIG["LIBRUBYARG_STATIC"] = "-Wl,-R -Wl,$(libdir) -L$(libdir) "

[email protected]:/opt/metasploit/msf3# /opt/metasploit-4.4.0/ruby/bin/bundle install

/opt/metasploit/msf3/msfupdate:143:in `block in run!': Cannot determine checkout type: `/opt/metasploit/msf3' (RuntimeError)
    from /opt/metasploit/msf3/msfupdate:135:in `chdir'
    from /opt/metasploit/msf3/msfupdate:135:in `run!'
    from /opt/metasploit/msf3/msfupdate:292:in `<main>'

curl -LO http://curl.haxx.se/ca/cacert.pem 

CURL_CA_BUNDLE=$PWD/cacert.pem 
curl -L http://r-7.co/UsEqxW > msfclone.rb 
MSFBASE=/opt/metasploit/msf3 ruby msfclone.rb

gem install -user-install typhoeus -v '0.4.2'
gem install -user-install typhoeus
gem install bundler && bundle install --without test development

update-alternatives --config ruby

/etc/init.d/metasploit stop
/var/lib/

sudo apt-get install metasploit --reinstall
sudo apt-get remove metasploit && sudo apt-get autoremove && sudo apt-get autoclean && sudo reboot

/var/lib/dpkg/info/metasploit.postinst
/var/lib/dpkg/info/metasploit.list
/var/lib/dpkg/info/metasploit.preinst
/var/lib/dpkg/info/metasploit.prerm
/usr/share/applications  start msfpro

[email protected]:~# dpkg -s curl

curl -L get.rvm.io | bash -s stable

vim .bashrc

[[ -s "/usr/local/rvm/scripts/rvm" ]] && source "/usr/local/rvm/scripts/rvm"
PATH=$PATH:/usr/local/rvm/bin

reboot

rvm install 1.9.3-p484 
rvm use ruby-1.9.3-p484  --default
rvm use ruby-1.9.3-p545  --default

source /opt/metasploit/scripts/setenv.sh
export MSFPROTOCOL=HTTPS
export GIT=/usr/bin/git

chmod 777 /opt/metasploit/apps/pro/engine/tmp
 /usr/local/rvm/rubies/ruby-1.9.3-p545/bin/ruby 
mv ~/.rvm/usr/lib ~/.rvm/usr/lib_rvm  

git clone --depth=1 git://github.com/rapid7/metasploit-framework msf3

标签:metasploit msf3