Create an EC2 instance with the Quick Start Ubuntu AMI.
Name: Metasploit-Ubuntu
Key pair name: Metasploit-Ubuntu-key-pair
When you get to the Network settings, click the Edit button.
Make sure you put it into the same VPC as the other instances.
Create a new Security Group for it.
Create a new Subnet for the instance. This will be your vulnerable subnet. So good security practice is even more imperative.
VPC: SOC-VPC
Subnet: defend-subnet
Auto-assign public IP: Enable
Metasploit-security-group
Type: ssh
Protocol: TCP
Port range: 22
Source type: Anywhere
Give it the same Network logical containers as the Kali instance.
Ex:
VPC CIDR block: 10.0.0.0/20
Subnet name: defend-subnet
Availability Zone: US East (Ohio) / us-east-2a
IPv4 subnet CIDR block: 10.0.0.0/24
You might not need much hard disk space, so you can leave at default 8GB EBS storage volume.
1x: 8 GiB gp3
Launch the instance.
You’ll be directed to the EC2 Instances page.
Check the box for the Metasploit instance you’ve just created, and click on the Connect tab.
Click on the copy to clipboard icon next to the chmod command on number 3. This command will secure the key-pair file you downloaded earlier.
Open your host machine’s terminal window.
Navigate to the Downloads folder.
Paste the command:
$ chmod 400 "Metasploit-Ubuntu-key-pair.pem"
This command has secured the key-pair file you downloaded earlier to only provide read permissions to root user, and restricts any other user of any permissions.
Go back to the Connect to instance page, and copy the ssh command in the provided Example at bottom of page.
Paste it into your host machine’s terminal.
When prompted with:
Are you sure you want to continue connecting (yes/no/[fingerprint])?
...type yes:
$ yes
You should see the message:
Warning: Permanently added '203.0.113.5' (ED25519) to the list of known hosts.
You’ve just added the public key to your system’s list of known hosts. Whenever you connect to this EC2 instance, the server will present it’s SSH key, and your host system will check in the known_hosts file for a matching key. If it matches, it is safe and you can connect.
You should now be connected to the Ubuntu Metasploit instance!
Run:
$ sudo apt update
$ sudo apt upgrade
...to update the debian dependencies.
The command to download and install Metasploit:
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && \
chmod 755 msfinstall && \
./msfinstall
Check for the new Metasploit file:
ls
You should now see an msfinstall file.
Check proper installation by executing the console for the Metasploit Framework:
msfconsole
Congrats! You’ve just run Metasploit!!
To exit the Metasploit console, type:
exit