All Rooms

Metasploit: Exploitation

easy1h 30mtryhackme

This room puts Metasploit to work against a real target. You'll use MSF's built-in scanners to enumerate the target (port scan, SMB, HTTP), store results in the MSF database, identify vulnerabilities, exploit them to get a shell, run post-exploitation to dump password hashes, and use msfvenom to generate a standalone payload (ELF reverse shell). The target is a Windows box running SMB and a web server. Key flags: THM-5455554845 from flag.txt, pirate's NTLM hash, and another user's password hash in /etc/shadow-style format. This room ties together the full MSF offensive workflow from recon to post-ex.

Skills You Will Learn

metasploitscanningsmb-enumerationexploitationmsfvenomhashdump

Prerequisites

Walkthrough Phases

1

Setting Up the MSF Database

Initialize the database to store scan results

2

Scanning with Metasploit

Enumerate open ports and running services

3

Vulnerability Scanning

Identify exploitable vulnerabilities using MSF modules

4

Exploitation

Gain initial access via a known vulnerability

5

Post-Exploitation: Flags and Hashes

Find flags and dump password hashes

6

Payload Generation with msfvenom

Generate standalone payloads for manual delivery

7

Second User Hash

Retrieve the remaining password hash

14 questions to answer

alienrecon start thm-metasploitexploitation

Don't have AlienRecon? Get started here