To access material, start machines and answer questions login.
In this room, we will learn how to use for vulnerability scanning and exploitation. We will also cover how the database feature makes it easier to manage penetration testing engagements with a broader scope. Finally, we will look at generating payloads with msfvenom and how to start a session on most target platforms.
- How to scan target systems using .
- How to use the database feature.
- How to use to conduct a vulnerability scan.
- How to use to exploit vulnerable services on target systems.
- How
msfvenomcan be used to create payloads and obtain a Meterpreter session on the target system.
Please note that for all questions that require using a wordlist (e.g brute-force attacks), we will be using the wordlist on the AttackBox found at the following path:
/usr/share/wordlists/MetasploitRoom/MetasploitWordlist.txt
If you opt to use your own machine, please download the wordlist by clicking the Download Task Files button to the right.
Start the AttackBox and run Metasploit using the msfconsole command to follow along with this room.
Ready to learn Cyber Security?
The Metasploit: Exploitation room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
