
| Tool | Function | Platform | License | Primary Use |
|---|---|---|---|---|
| Nmap | Network discovery and security scanning | Cross-platform | Open-source | Network mapping and port scanning |
| Metasploit | Penetration testing framework | Cross-platform | Open-source | Exploitation and vulnerability testing |
STRATEGY
What is Payload?
Host and Victim Device Info.:
| Machine | Details |
|---|---|
| Attack Machine | 192.168.0.106 |
| Metasploitable 2 - Host/Victim | 192.168.0.107 |
Information Gathering
Introduction to NMAP (Network Mapper)
Nmap, short for Network Mapper, is a versatile and powerful tool used by network administrators and security professionals to discover devices, scan open ports, and identify potential vulnerabilities in a network. Whether mapping out your network or probing an external system, Nmap provides detailed insights into the services running on various hosts, helping you assess the security posture and uncover hidden threats.
Using Nmap, we will find the version of the FTP Service we want to exploit.
The version of FTP Service:
To find the version of the FTP service, we need to follow below steps:
EXPLOITATION
Introduction to Metasploit
Metasploit is a widely used penetration testing framework that simplifies the process of exploiting vulnerabilities in systems. With its extensive database of exploits, payloads, and auxiliary modules, Metasploit allows security professionals to simulate real-world attacks, test defenses, and gain a deeper understanding of potential security risks. Whether you're performing a vulnerability assessment or developing custom exploits, Metasploit is an indispensable tool in the ethical hacker's toolkit.
METHOD of EXPLOITATION
Here we can see the RHOSTS (Remote Host) section is blank. Now what is the meaning of RHOST? RHOST means the IP address of the target machine. As we seen upper that, our host machine IP is 192.168.0.107. Now lets setup this IP to the RHOST section.
As we are watching the RHOST has been set. Now we need run an exploit command to run the file to get access to the victim machine.
As we can see shell session 1 opened. That means we got access to our victim machine and now we can run UNIX/Linux command to this shell to explore the machine. So, as proof of the project that we got access to our victim machine, let's try to see to which user we are logged in.
DISCLAIMER
The information provided in this guide is for educational and informational purposes only. The techniques and tools discussed, including Nmap and Metasploit, are intended for ethical use in controlled environments or with explicit permission from the system owner. Unauthorized access or testing of networks, systems, or devices without permission is illegal and unethical. The author and publisher are not responsible for any misuse or damages resulting from the use of this information. Always ensure you have proper authorization before performing any penetration testing or security assessments.

0 Comments:
Post a Comment