๐ฅ Complete Guide to Metasploit: Scanning, Exploitation & Msfvenom (With All Answers)
๐ฅ Complete Guide to Metasploit: Scanning, Exploitation & Msfvenom (With All Answers)
In this blog, I’ll walk you through the full process of using Metasploit Framework for:
-
Port Scanning
-
Vulnerability Scanning
-
Exploitation
-
Post-Exploitation
-
Using the Metasploit Database
-
Creating Payloads with MSFvenom
This guide includes all answers from the room.
๐ 1. Introduction to Metasploit
Metasploit is an exploitation framework used for:
-
Scanning targets
-
Identifying vulnerabilities
-
Exploiting services
-
Managing sessions
-
Generating payloads
Start Metasploit:
๐ 2. Port Scanning with Metasploit
You can search for scanning modules:
Example module:
Set required options:
You can also run Nmap directly:
✅ Answers (Scanning Section)
Q1: How many ports are open on the target system?
๐ 5
Q2: Using the relevant scanner, what NetBIOS name can you see?
๐ ACME IT SUPPORT
Q3: What is running on port 8000?
๐ webfs/1.21
Q4: What is the "penny" user's SMB password?
๐ leo1234
๐ 3. Metasploit Database
Metasploit can store scan results in a database.
Start PostgreSQL:
Initialize DB:
Check status:
๐ Workspaces
Create workspace:
Switch workspace:
๐ Save Nmap Results to Database
View stored data:
๐งช 4. Vulnerability Scanning
Metasploit helps find “low-hanging fruit” vulnerabilities.
Example: VNC Login Scanner
✅ Answer (Vulnerability Section)
Q: Who wrote the module that allows us to check SMTP servers for open relay?
๐ Campbell Murray
๐ฅ 5. Exploitation
Metasploit contains thousands of exploits.
Example: MS17-010 (EternalBlue)
๐ฏ Successful Exploitation Results
After exploitation:
-
Shell session opened
-
Retrieved flag
-
Dumped password hashes
✅ Answers (Exploitation Section)
Q: What is the content of the flag.txt file?
๐ THM-5455554845
Q: What is the NTLM hash of the password of the user "pirate"?
๐ 8ce9a3ebd1647fcc5e04025019f4b875
๐ 6. MSFvenom – Payload Generation
MSFvenom generates custom payloads.
List payloads:
๐ง Generate Linux Meterpreter (.elf)
Transfer to target:
๐ง Setup Multi Handler
Meterpreter session received ✅
๐ Post Exploitation – Dump Hashes
Use post module:
✅ Final Answer (MSFvenom Section)
Q: What is the other user's password hash?
๐
๐ Final Summary
In this room, we learned:
✔ How to scan using Metasploit
✔ How to use the Metasploit database
✔ How to identify vulnerabilities
✔ How to exploit services
✔ How to manage sessions
✔ How to generate payloads using MSFvenom
✔ How to use multi/handler
✔ How to perform post-exploitation
๐ง Final Answers List (Quick Reference)
| Question | Answer |
|---|---|
| Open Ports | 5 |
| NetBIOS Name | ACME IT SUPPORT |
| Port 8000 Service | webfs/1.21 |
| Penny SMB Password | leo1234 |
| SMTP Open Relay Module Author | Campbell Murray |
| flag.txt Content | THM-5455554845 |
| Pirate NTLM Hash | 8ce9a3ebd1647fcc5e04025019f4b875 |
| Other User Hash | $6$Sy0NNIXw$SJ27WltHI89hwM5UxqVGiXidj94QFRm2Ynp9p9kxgVbjrmtMez9EqXoDWtcQd8rf0tjc77hBFbWxjGmQCTbep0 |



Comments
Post a Comment