From the course: Penetration Testing with Metasploit
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Basic exploitation steps: FTP brute force - Metasploit Tutorial
From the course: Penetration Testing with Metasploit
Basic exploitation steps: FTP brute force
- [Instructor] Now that we have understood how Metasploit works, what are its architectural components, what are some basic commands of Metasploit, and we have done a successful vulnerability assessment using Metasploit, let's look at the exploitation features offered by Metasploit. Target exploitation using Metasploit is relatively simple. It revolves around the usage of some basic commands, like search, use, run, and info. There are several other commands used as well. We'll discuss those when we come across them. For now, let us understand that I have a target at 10.0.2.12. This is my Metasploitable machine. Let us start by running a basic nmap scan against this particular target. As you may note that I'm not using any additional flags or any specific qualifiers. I'm not even specifying the port ranges. Why? Because using those may slow things down and the course is not intended to give you a…