Viewing 6 posts - 16 through 21 (of 21 total)
  • Author
    Posts
  • #42049
    arminius
    Participant

    Yeah, quite exciting.

    Here are the results.

    That should be everything you asked for.

    #42087
    Diego PérezDiego Pérez
    Moderator

    Hi!
    You are missing ifconfig and route -n in metasploitable, that’s the thid machine, the one you are going to pivot on. Or which is the thid machine connected to 10.5.15.1 network?

    Let me know.
    Diego

    #42105
    arminius
    Participant

    The Third Machine is an Ubuntu system. It is the target computer.

    Screenshot

    #42243
    Diego PérezDiego Pérez
    Moderator

    Hi!
    So you can try the attack but it’s very probable that it won’t work as we need that the third machine has any open vulnerable service, that’s why we use metasploitable.

    But try it anyway.

    Let me know how it goes!
    Diego

    #42257
    arminius
    Participant

    So what type of vulnerable services?

    All of our office computers are windows OS. Also, where do I download the Metasploitable machine? There was no link provided in the lecture.

    #42395
    Diego PérezDiego Pérez
    Moderator

    Hi!
    First don’t try any of the attacks against machines you don’t have permission to. To download metasploitable: https://information.rapid7.com/download-metasploitable-2017.html

    A vulnerable service is discovered using a scanner tool like zenmap, but this a whole process. The Ethical Hacking or the Website Hcking courses show this kind of techniques.

    Hope it helps!
    Diego

Viewing 6 posts - 16 through 21 (of 21 total)
  • You must be logged in to reply to this topic.