Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Metasploit: Exploitation

Premium room

Using Metasploit for scanning, vulnerability assessment and exploitation.

easy

20 min

164,870

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

In this room, we will learn how to use for vulnerability scanning and exploitation. We will also cover how the database feature makes it easier to manage penetration testing engagements with a broader scope. Finally, we will look at generating payloads with msfvenom and how to start a session on most target platforms.


More specifically, the topics we will cover are:
  • How to scan target systems using .
  • How to use the database feature.
  • How to use to conduct a vulnerability scan.
  • How to use to exploit vulnerable services on target systems.
  • How msfvenom can be used to create payloads and obtain a Meterpreter session on the target system.


Please note that for all questions that require using a wordlist (e.g brute-force attacks), we will be using the wordlist on the AttackBox found at the following path:

/usr/share/wordlists/MetasploitRoom/MetasploitWordlist.txt 

If you opt to use your own machine, please download the wordlist by clicking the Download Task Files button to the right.

Start the AttackBox and run Metasploit using the msfconsole command to follow along with this room.

Answer the questions below
Start the AttackBox and run Metasploit using the msfconsole command to follow along this room.

Ready to learn Cyber Security?

The Metasploit: Exploitation room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.