From the course: Penetration Testing with Metasploit

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Basic exploitation steps: FTP brute force

Basic exploitation steps: FTP brute force - Metasploit Tutorial

From the course: Penetration Testing with Metasploit

Basic exploitation steps: FTP brute force

- [Instructor] Now that we have understood how Metasploit works, what are its architectural components, what are some basic commands of Metasploit, and we have done a successful vulnerability assessment using Metasploit, let's look at the exploitation features offered by Metasploit. Target exploitation using Metasploit is relatively simple. It revolves around the usage of some basic commands, like search, use, run, and info. There are several other commands used as well. We'll discuss those when we come across them. For now, let us understand that I have a target at 10.0.2.12. This is my Metasploitable machine. Let us start by running a basic nmap scan against this particular target. As you may note that I'm not using any additional flags or any specific qualifiers. I'm not even specifying the port ranges. Why? Because using those may slow things down and the course is not intended to give you a…

Contents