Metasploit: Introduction
-
No answer needed
No Answer
-
What is the name of the code taking advantage of a flaw on the target system ?
Answer : Exploit
-
What is the name of the code that runs on the target system to achieve the attacker's goal ?
Answer : Payload
-
What are self-contained payloads called ?
Answer : Singles
-
Is "windows/x64/pingback_reverse_tcp" among singles or staged payload ?
Answer : Singles
-
How would you search for a module related to Apache ?
Anwser : search Apache
-
Who provided the auxiliary/scanner/ssh/ssh_login module ?
msf5 > info auxiliary/scanner/ssh/ssh_login
Name: SSH Login Check Scanner
Module: auxiliary/scanner/ssh/ssh_login
License: Metasploit Framework License (BSD)
Rank: Normal
Provided by:
todb <[email protected]>
[...]
Anwser : todb
-
How would you set the LPORT value to 6666 ?
Answer : set LPORT 6666
-
How would you set the global value for RHOSTS to 10.10.19.23 ?
Answer : setg RHOSTS 10.10.19.23
-
What command would you use to clear a set payload?
Answer : unset PAYLOAD
-
What command do you use to proceed with the exploitation phase?
Answer : exploit
No answer needed.