Tagged: autorun, metasploit, post, usermap_script
- This topic has 20 replies, 2 voices, and was last updated 4 years, 7 months ago by
Diego Pérez.
- AuthorPosts
- July 14, 2020 at 3:01 pm #42049
arminius
ParticipantJuly 15, 2020 at 3:55 am #42087Diego Pérez
ModeratorHi!
You are missing ifconfig and route -n in metasploitable, that’s the thid machine, the one you are going to pivot on. Or which is the thid machine connected to 10.5.15.1 network?Let me know.
DiegoJuly 15, 2020 at 2:59 pm #42105arminius
ParticipantThe Third Machine is an Ubuntu system. It is the target computer.
July 16, 2020 at 4:19 am #42243Diego Pérez
ModeratorHi!
So you can try the attack but it’s very probable that it won’t work as we need that the third machine has any open vulnerable service, that’s why we use metasploitable.But try it anyway.
Let me know how it goes!
DiegoJuly 16, 2020 at 11:41 am #42257arminius
ParticipantSo what type of vulnerable services?
All of our office computers are windows OS. Also, where do I download the Metasploitable machine? There was no link provided in the lecture.
July 17, 2020 at 4:08 am #42395Diego Pérez
ModeratorHi!
First don’t try any of the attacks against machines you don’t have permission to. To download metasploitable: https://information.rapid7.com/download-metasploitable-2017.htmlA vulnerable service is discovered using a scanner tool like zenmap, but this a whole process. The Ethical Hacking or the Website Hcking courses show this kind of techniques.
Hope it helps!
Diego - AuthorPosts
- You must be logged in to reply to this topic.