To access material, start machines and answer questions login.
In the previous room, you learned how to navigate the Framework: searching for modules, configuring parameters, launching exploits, and managing sessions. Those are the mechanics. In this room, you put them to work.
Stratford Systems has given your team the green light to proceed with active testing against their internal network. Your scope includes a small subnet containing a Windows workstation and a server, both running production services. Your objectives are straightforward: identify what is running on each host, determine which services are vulnerable, exploit those vulnerabilities to gain access, and document your findings.
Learning Objectives
- Scan target systems using 's built-in port scanning and service enumeration modules
- Store and manage results using the database, including workspaces, host tracking, and credential storage
- Identify vulnerabilities by running targeted scanner modules against discovered services
- Exploit vulnerable services on two different target systems using two distinct exploit types, demonstrating that the workflow generalizes across protocols, operating systems, and vulnerability classes
Prerequisites
This room builds directly on : The Basics. You should be comfortable with:
- Launching
msfconsoleand usingsearch,use,info, andback - Setting module parameters with
set,setg, andshow options - Running modules with
exploit/runand managing sessions withbackground,sessions, andsessions -i
Machine Access
Each machine can be started from its respective task. The lab primarily consists of two target environments:
| Host | OS |
|---|---|
| STRATFORD-WS01 | Windows Server 2008 R2 |
| stratford-srv01 | Ubuntu Linux |
Start the AttackBox and the target machine by clicking the Start AttackBox and Start Machine buttons. Once the AttackBox has launched, open the terminal and enter the command msfconsole to begin exploring scanning and exploitation techniques.
Set up your virtual environment
I have successfully started the machines.
Ready to learn Cyber Security?
The Metasploit: Scanning and Exploitation room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
