O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using Metasploit to exploit Heartbleed

In this recipe, we will be using Metasploit, available in Kali Linux, to exploit to the Heartbleed vulnerability. It is not mandatory to use Metasploit to exploit Heartbleed. It can be done using simple Python script or a simple Burp plugin (in the free version) to figure out whether the server/service is vulnerable to Heartbleed. However, we wanted to introduce Metasploit exploit and an auxiliary module, which can be very helpful at times.

Getting ready

To step through this recipe, you will need the following:

  • Kali Linux running on Oracle Virtualbox/VMware
  • Docker running on Kali Linux
  • Vulnerable Web Application Docker container
  • An Internet connection

How to do it...

For this recipe, you need to perform the following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required