Metasploit
Metasploit
Metasploit
Overview
This Labtainer exercise explores the use of the metasploit tool which is installed on a Kali Linux
system (attacker) and is meant to learn simple penetration skills on a purposely vulnerable
metasploitable host (victim).
Note: the attacker computer is configured to have IP address 192.168.1.3 while the victim
computer is 192.168.1.2
labtainer metasploit
Tasks
ping 192.168.1.2
cat /root/filetoview.txt
sudo msfconsole
Note you will see a warning about a missing database, you can ignore that.
search distccd
Note: when the exploit has succeeded, no prompt is shown but a shell is created
View and set options as necessary (RHOST option) run the exploit and display root file.
View and set options as necessary (RHOST option), run the exploit and display root file
View and set options as necessary (RHOST option), run the exploit and display root file
View and set options as necessary (RHOST option) run the exploit
stoplab
from the host Labtainer working directory. You can always restart the
Labtainer to continue your work. When the Labtainer is stopped, a
zip file is created and copied to a location displayed by the stoplab
command. When the lab is completed, send that zip file to the instructor.