Exploitation Basics: Introduction (TryHackMe)

J3bitokJ3bitok
1 min read

In this article, I will write a write-up for Metasploit: Introduction that covers the Introduction to Metasploit, Main Components of Metasploit, Msfonsole, and Working with modules.

  1. What is the name of the code taking advantage of a flaw on the target system? Exploit

  2. What is the name of the code that runs on the target system to achieve the attacker's goal? Payload

  3. What are self-contained payloads called? Singles

  4. Is "windows/x64/pingback_reverse_tcp" among singles or staged payload? Singles

  5. How would you search for a module related to Apache? search apache

  6. Who provided the auxiliary/scanner/ssh/ssh_login module? todb

  7. How would you set the LPORT value to 6666? set LPORT 6666

  8. How would you set the global value for RHOSTS to 10.10.19.23 ? setg RHOSTS 10.10.19.23

  9. What command would you use to clear a set payload? unset PAYLOAD

  10. What command do you use to proceed with the exploitation phase? exploit

Thank you for reading my article. Please leave any questions or comments on improving my learning journey and the THM challenges. We can also connect more on LinkedIn or X.

0
Subscribe to my newsletter

Read articles from J3bitok directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

J3bitok
J3bitok

Software Developer Learning Cloud and Cybersecurity Open for roles * If you're in the early stages of your career in software development (student or still looking for an entry-level role) and in need of mentorship you can book a session with me on Mentorlst.com.