- July 14, 2020 at 3:01 pm #42049
Yeah, quite exciting.
Here are the results.
That should be everything you asked for.July 15, 2020 at 3:55 am #42087
You are missing ifconfig and route -n in metasploitable, that’s the thid machine, the one you are going to pivot on. Or which is the thid machine connected to 10.5.15.1 network?
Let me know.
DiegoJuly 15, 2020 at 2:59 pm #42105July 16, 2020 at 4:19 am #42243
So you can try the attack but it’s very probable that it won’t work as we need that the third machine has any open vulnerable service, that’s why we use metasploitable.
But try it anyway.
Let me know how it goes!
DiegoJuly 16, 2020 at 11:41 am #42257
So what type of vulnerable services?
All of our office computers are windows OS. Also, where do I download the Metasploitable machine? There was no link provided in the lecture.July 17, 2020 at 4:08 am #42395
First don’t try any of the attacks against machines you don’t have permission to. To download metasploitable: https://information.rapid7.com/download-metasploitable-2017.html
A vulnerable service is discovered using a scanner tool like zenmap, but this a whole process. The Ethical Hacking or the Website Hcking courses show this kind of techniques.
Hope it helps!
- You must be logged in to reply to this topic.