THM | Metasploit: Introduction
Windows Exploitation Basics | Metasploit: Introduction | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Metasploit: Introduction room.
Disclaimer: Please note that this write-up is NOT intended to replace the original room or its content, but rather serve as supplementary material for those who are stuck and need additional guidance.
Task | 1 | Introduction to Metasploit
Question 1: No answer needed
No answer needed
Task | 2 | Main Components of Metasploit
Question 1: What is the name of the code taking advantage of a flaw on the target system?
Exploit
Question 2: What is the name of the code that runs on the target system to achieve the attacker's goal?
Payload
Question 3: What are self-contained payloads called?
Singles
Question 4: Is "windows/x64/pingback_reverse_tcp" among singles or staged payload?
Singles
Task | 3 | Msfconsole
Question 1: How would you search for a module related to Apache?
search apache
Question 2: Who provided the auxiliary/scanner/ssh/ssh_login module?
todb
Task | 4 | Working with modules
Question 1: How would you set the LPORT value to 6666?
set LPORT 6666
Question 2: How would you set the global value for RHOSTS to 10.10.19.23 ?
setg RHOSTS 10.10.19.23
Question 3: What command would you use to clear a set payload?
unset PAYLOAD
Question 4: What command do you use to proceed with the exploitation phase?
exploit
Task | 5 | Summary
Question 1: No answer needed.
No answer needed