Skip to main content

THM | Metasploit: Introduction

· 2 min read

Windows Exploitation Basics | Metasploit: Introduction | Summary:

This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Metasploit: Introduction room.


Disclaimer: Please note that this write-up is NOT intended to replace the original room or its content, but rather serve as supplementary material for those who are stuck and need additional guidance.

Task | 1 | Introduction to Metasploit

Question 1: No answer needed

No answer needed

Task | 2 | Main Components of Metasploit

Question 1: What is the name of the code taking advantage of a flaw on the target system?

Exploit

Question 2: What is the name of the code that runs on the target system to achieve the attacker's goal?

Payload

Question 3: What are self-contained payloads called?

Singles

Question 4: Is "windows/x64/pingback_reverse_tcp" among singles or staged payload?

Singles

Task | 3 | Msfconsole

Question 1: How would you search for a module related to Apache?

search apache

Question 2: Who provided the auxiliary/scanner/ssh/ssh_login module?

todb

Task | 4 | Working with modules

Question 1: How would you set the LPORT value to 6666?

set LPORT 6666

Question 2: How would you set the global value for RHOSTS to 10.10.19.23 ?

setg RHOSTS 10.10.19.23

Question 3: What command would you use to clear a set payload?

unset PAYLOAD

Question 4: What command do you use to proceed with the exploitation phase?

exploit

Task | 5 | Summary

Question 1: No answer needed.

No answer needed