Intro to Metasploit #1

SCENARIO INFORMATION

DESCRIPTION:

This scenario serves as a guide on how to:

  • Exploit vulnerabilities using Metasploit framework
  • Use metasploit framework console interface, and some of the different types of modules available.
  • Identify Vulnerabilities using Metasploit framework

OBJECTIVES AND OUTCOME:

After completing this scenario you will be able to:

  • Searching for modules
  • Getting more information for specific modules –
  • Using auxiliary modules
  • Using exploit modules – Choosing suitable payloads
  • Submit a flag after completing the task

PRE-REQUISITES:

In order to get the full benefit from this scenario, it is suggested that you have competencies in the following areas:

  • Metasploit framework installation
  • Basic linux usage

RECOMMENDED READING:

It is suggested that you consult with these recommended reading resources and pre-existing scenarios

AUTHOR:

This scenario was created by Simon Loizides

MODE SINGLEPLAYER
Type CYBER CHALLENGE
DIFFICULTY EASY
TIME 60 MINUTES
COST 10 GEMS

Start Scenario

RegisterLogin
Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on reddit
Reddit
Share on whatsapp
WhatsApp
Share on telegram
Telegram
Scroll to Top