✔️ Use metasploit and meterpreter against a real machine
✔️ Get familiar with the metasploit framework and features
Use metasploit and meterpreter against a real machine
✔️ Identify the target machine on the network
✔️ Find a vulnerable service
✔️ Exploit the service by using Metasploit to get a meterpreter session
✔️ Gather information about the machine by using meterpreter commands
✔️ Search for a file named "Congrats.txt"
1️⃣ Find the target on the network
2️⃣ Identify available services on the target
3️⃣ Find a vulnerable service in Metasploit
4️⃣ Configure the module and exploit the machine
5️⃣ Obtain SYSTEM privileges on the machine