Tagged: autorun, metasploit, post, usermap_script
- This topic has 20 replies, 2 voices, and was last updated 4 years, 4 months ago by Diego Pérez.
- AuthorPosts
- July 14, 2020 at 3:01 pm #42049arminiusParticipantJuly 15, 2020 at 3:55 am #42087Diego PérezModerator
Hi!
You are missing ifconfig and route -n in metasploitable, that’s the thid machine, the one you are going to pivot on. Or which is the thid machine connected to 10.5.15.1 network?Let me know.
DiegoJuly 15, 2020 at 2:59 pm #42105arminiusParticipantThe Third Machine is an Ubuntu system. It is the target computer.
July 16, 2020 at 4:19 am #42243Diego PérezModeratorHi!
So you can try the attack but it’s very probable that it won’t work as we need that the third machine has any open vulnerable service, that’s why we use metasploitable.But try it anyway.
Let me know how it goes!
DiegoJuly 16, 2020 at 11:41 am #42257arminiusParticipantSo what type of vulnerable services?
All of our office computers are windows OS. Also, where do I download the Metasploitable machine? There was no link provided in the lecture.
July 17, 2020 at 4:08 am #42395Diego PérezModeratorHi!
First don’t try any of the attacks against machines you don’t have permission to. To download metasploitable: https://information.rapid7.com/download-metasploitable-2017.htmlA vulnerable service is discovered using a scanner tool like zenmap, but this a whole process. The Ethical Hacking or the Website Hcking courses show this kind of techniques.
Hope it helps!
Diego - AuthorPosts
- You must be logged in to reply to this topic.