Metasploit: Exploitation
This room puts Metasploit to work against a real target. You'll use MSF's built-in scanners to enumerate the target (port scan, SMB, HTTP), store results in the MSF database, identify vulnerabilities, exploit them to get a shell, run post-exploitation to dump password hashes, and use msfvenom to generate a standalone payload (ELF reverse shell). The target is a Windows box running SMB and a web server. Key flags: THM-5455554845 from flag.txt, pirate's NTLM hash, and another user's password hash in /etc/shadow-style format. This room ties together the full MSF offensive workflow from recon to post-ex.
Skills You Will Learn
Prerequisites
- thm-metasploitintro
- metasploit
- msfconsole
Walkthrough Phases
Setting Up the MSF Database
Initialize the database to store scan results
Scanning with Metasploit
Enumerate open ports and running services
Vulnerability Scanning
Identify exploitable vulnerabilities using MSF modules
Exploitation
Gain initial access via a known vulnerability
Post-Exploitation: Flags and Hashes
Find flags and dump password hashes
Payload Generation with msfvenom
Generate standalone payloads for manual delivery
Second User Hash
Retrieve the remaining password hash
14 questions to answer
alienrecon start thm-metasploitexploitationDon't have AlienRecon? Get started here