Intro to Metasploit #1

SCENARIO INFORMATION

DESCRIPTION:

This scenario serves as a guide on how to:

  • Exploit vulnerabilities using Metasploit framework
  • Use metasploit framework console interface, and some of the different types of modules available.
  • Identify Vulnerabilities using Metasploit framework

OBJECTIVES AND OUTCOME:

After completing this scenario you will be able to:

  • Searching for modules
  • Getting more information for specific modules –
  • Using auxiliary modules
  • Using exploit modules – Choosing suitable payloads
  • Submit a flag after completing the task

PRE-REQUISITES:

In order to get the full benefit from this scenario, it is suggested that you have competencies in the following areas:

  • Metasploit framework installation
  • Basic linux usage

RECOMMENDED READING:

It is suggested that you consult with these recommended reading resources and pre-existing scenarios

AUTHOR:

This scenario was created by Simon Loizides

MODE SINGLEPLAYER
Type CYBER CHALLENGE
DIFFICULTY EASY
TIME 60 MINUTES

Start Scenario

RegisterLogin

Other Scenarios

Facebook
Twitter
LinkedIn
Reddit
WhatsApp
Telegram
Scroll to Top

Upcoming Webinar Events

Join CYBER RANGES and guests on live Webinars and Bootcamps

Sign up to learn skills and practise on the CYBER RANGES platform