Lab 6

Using Metasploit to find weaknesses and penetrate systems


The goal of this lab is to learn how to use the Metasploit framework (built into Kali) to find and utilize exploits to penetrate and control another system. We will be using "Metaploitable 2", a version of Linux with many known security gaps, as our primary target system as we learn how to use Metasploit. Note that the tools we use here are REAL, and can, in theory, be used against ANY system you encounter. You must ONLY scan and penetrate systems you either have as VM's on your computer, or other systems you have been given specific permission to access. Using these tools against other systems is illegal, can get you arrested, and will earn you a "F" in this course at the very least.


Edit | Attach | Print version | History: r3 < r2 < r1 | Backlinks | Raw View | Raw edit | More topic actions...
Topic revision: r1 - 2014-03-14 - JimSkon
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback