Task 6 [Section 3 - Metasploit]: Intro
Task 7 [Section 3 Metasploit]: Setting Up
What command allows you to search modules?
How do you select a module?
How do you display information about a specific module?
How do you list options that you can set?
What command lets you view advanced options for a specific module?
How do you show options in a specific category
Task 8 [Section 3 - Metasploit]: - Selecting a module
How do you select the eternalblue module?
What option allows you to select the target host(s)?
How do you set the target port?
How would you set the SMBUser to "password"?
What flag do you set if you want the exploit to run in the background?
How do you list all current sessions?
What flag allows you to go into interactive mode with a session("drops you either into a meterpreter or regular shell")
Task 9 [Section 3 - Metasploit]: meterpreter
What command allows you to download files from the machine?
What command allows you to upload files to the machine?
How do you list all running processes?
How do you change processes on the victim host(Ideally it will allow you to change users and gain the perms associated with that user)
How do you execute a command on the remote host?
What command starts an interactive shell on the remote host?
How do you find files on the target host(Similar function to the linux command "find")
How do you get the output of a file on the remote host?
How do you put a meterpreter shell into "background mode"(allows you to run other msf modules while also keeping the meterpreter shell as a session)?
Task 10 [Section 3 - Metasploit]: Final Walkthrough
What variable do you need to set, to select the remote host
How do you set the port to 80
How do you set listening address(Your machine)
Exploit the machine!
What is the name of the secret directory in the /var/nostromo/htdocs directory?
What are the contents of the file inside of the directory?
0 Comments