Tagged: autorun, metasploit, post, usermap_script This topic has 20 replies, 2 voices, and was last updated 11 months, 1 week ago by diego. Viewing 6 posts - 16 through 21 (of 21 total) ← 1 2 Author Posts July 14, 2020 at 3:01 pm #42049 arminiusParticipant Yeah, quite exciting. Here are the results. That should be everything you asked for. July 15, 2020 at 3:55 am #42087 diegoModerator Hi! You are missing ifconfig and route -n in metasploitable, that’s the thid machine, the one you are going to pivot on. Or which is the thid machine connected to 10.5.15.1 network? Let me know. Diego July 15, 2020 at 2:59 pm #42105 arminiusParticipant The Third Machine is an Ubuntu system. It is the target computer. Screenshot July 16, 2020 at 4:19 am #42243 diegoModerator Hi! So you can try the attack but it’s very probable that it won’t work as we need that the third machine has any open vulnerable service, that’s why we use metasploitable. But try it anyway. Let me know how it goes! Diego July 16, 2020 at 11:41 am #42257 arminiusParticipant So what type of vulnerable services? All of our office computers are windows OS. Also, where do I download the Metasploitable machine? There was no link provided in the lecture. July 17, 2020 at 4:08 am #42395 diegoModerator Hi! First don’t try any of the attacks against machines you don’t have permission to. To download metasploitable: https://information.rapid7.com/download-metasploitable-2017.html A vulnerable service is discovered using a scanner tool like zenmap, but this a whole process. The Ethical Hacking or the Website Hcking courses show this kind of techniques. Hope it helps! Diego Author Posts Viewing 6 posts - 16 through 21 (of 21 total) ← 1 2 You must be logged in to reply to this topic.