Posts

Showing posts from November, 2022

Exploiting Windows Xp using Metasploit Part-2

Image
     Exploiting Windows xp using metasploit Note :  Before we move on I would recommend you to go through this blog which covers all the basics of metasploit , well kind of prequel to this . Being that said we are going to particularly exploit a vulneribility called ms08_067_netapi , to know more about the vulneribility click here. Though we know we are going to exploit windows xp machine , let's pretent that we have no idea regarding what operating system the target machine is using which gives us a close enough experience of real world pentest. In the upcomming learnings if you have any trouble  using smb scanner or exploiting the remote machine, then you must add the file sharing option in the firewall exception rules Hoping that you have gone through the prequel of this blog , let's move on..............  To know what operating systems the remote hosts Command :  db_nmap -A <your subnet> Fig : 1.0 In Fig : 1.0 we have performed an aggres...

Metasploit Basics Part-1

Image
                                Metasploit basics The Metasploit framework is a very powerful tool which is used by cybercriminals and ethical hackers.  Metasploit has ready-made or already written codes which upon execution gives us some level of access depending on the payload or lets us the make changes on the vulnerable remote system which normally isn't supposed to happen or which isn't allowed . no one but me how I feel when I use metasploit :  In this blog we are going to learn about the basics such as starting a database , connecting metasploit to the database and many more , In simple words in this blog we are going to take a tour around metasploit and try everything . Well isn't that a nice prespective :) So without making this a drag  blast up that cool terminal and get ready to make your hands dirty 🔥🔥🔥 Starting Database Service :  Firstly start the PostgreSQL service on th...