Metasploit (Jiale and Xiao)

I just want follow a demo and try it!

Or looking for practice?

Contents

  1. Background
  2. Launching
  3. Get help and info
  4. Information Gathering
  5. Pick a vulnerability and use an exploit
  6. Configure the exploit
  7. Execute the payload
  8. Exploit or check
  9. Database and workspace
  10. Resources

Background

Launching

Get help and info

Information Gathering

Pick a vulnerability and use an exploit

Configure the exploit

Execute the payload

Exploit or check

Database and workspace

Resources