logo

Metasploit on OS X Mavericks

I show you the steps that I followed to install Metasploit on Mavericks, with some solutions that I have used to solve some mistakes that I encountered during the installation.

First of all download and install Command Line Tools (OSX 10.9):

Command-line-tools

Install Java Development Kit (JDK) from: from:http://www.oracle.com/technetwork/java/javase/downloads

Install “Homebrew” :

ruby -e “$(curl -fsSL https://raw.github.com/Homebrew/homebrew/go/install)”

echo PATH=/usr/local/bin:/usr/local/sbin:$PATH >> ~/.bash_profile

Install “NMAP”:

brew install nmap

Install “wget”:

brew install wget

Install “git”:

brew install git

To verify the version of gcc and g++ type:

gcc -v

g++ -v

If not present, install gcc:

brew tap homebrew/versions brew install gcc47 –use-gcc

Check with “brew doctor” that there are no problems:

brew doctor

If you get the following error:

Error: No such file or directory – /usr/local/Cellar

Type:

sudo mkdir /usr/local/Cellar

sudo chown -R `whoami` /usr/local

Then run:

brew update

Install “Ruby” version 1.9.3:

brew install homebrew/versions/ruby193

To check the version:

ruby -v

If you want to install “Ruby” with rvm you can proceed as follows:

curl -L get.rvm.io | bashrvm get headrvm requirementsrvm install 1.9.3 rvm use 1.9.3rvm default 1.9.3

If during compilation it’s presented to you an error about gcc4.7, you can try to solve it with:

CC=/usr/local/bin/gcc-4.2 rvm install 1.9.3 –enable-sharedrvm use 1.9.3 –default

Install Ruby Msgpack:

port install msgpack

Install gem MSGPACK:

gem install msgpack

Set to use VNCViewer:

echo ‘#!/usr/bin/env bash’>> /usr/local/bin/vncviewer

echo open vnc://\$1 >> /usr/local/bin/vncviewer

chmod +x /usr/local/bin/vncviewer

Install the open source database “postgresql”:

brew install postgresql –without-ossp-uuid

Create a user with the name “MSF” (you will be prompted to enter and confirm a password, it will need us to configure the database):

createuser msf -P -h localhost

Create a database called msf:

createdb -O msf msf -h localhost

Install with “gem” other packages that will be used with MSF:

gem install pg sqlite3 msgpack activerecord redcarpet rspec simplecov yard bundler

Install “Metasploit”:

cd /usr/local/share/

git clone https://github.com/rapid7/metasploit-framework.git

cd metasploit-framework

for MSF in $(ls msf*); do ln -s /usr/local/share/metasploit-framework/$MSF /usr/local/bin/$MSF;done

sudo chmod go+w /etc/profile

sudo echo export MSF_DATABASE_CONFIG=/usr/local/share/metasploit-framework/database.yml >> /etc/profile

Go into the Metasploit directory and type:

sudo bundle install

Install Ruby gem:

gem install pg sqlite3 msgpack hpricot

Configure the database just created:

vim /usr/local/share/metasploit-framework/database.yml

Open with “vim” the file database.yml and type:

production:

adapter: postgresql

database: msf

username: msf

password: (enter the password previously typed)

host: 127.0.0.1

port: 5432

pool:75

timeout: 5

Save and exit:

esc:wq

Type:

source /etc/profile

source ~/.bash_profile

Run Metasploit:

sudo msfconsole

msfconsole

metaspoit-maxblogDone

Lascia un commento