From the course: Metasploit Essential Training

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Configuring an exploit and payload

Configuring an exploit and payload

From the course: Metasploit Essential Training

Configuring an exploit and payload

- [Instructor] Now, once we've identified the target that we wish to utilize, then of course it becomes the next few steps, which is about exploitation and whatever the payload is that we wish to utilize. So, from a simplistic perspective, remember that we can use search type:exploit and we can go and identify the types of exploit that we're after. Once we've chose that exploit, then all the exploits are connected using use command. So, use exploit is the folder, and then, of course we choose our operating system at this point. So, it's either going to be Windows, Linux, or something else. So, I'm going to type windows and then we choose the types that are available. I'm going to use my SMB and then we'll use the standard one we've used a few times here, which is psexec. So the psexec one is the standard one that I want to utilize just for this. Now the default payload that gets set is the Windows meterpreter, reverse TCP.…

Contents