Welcome! We’ll apply many tools covered in the previous lessons- like Nmap, BurpSuite, Metasploit, and Wireshark- to get root access on this vulnerable machine. Once you’ve connected to TryHackMe’s VPN and started the machine, let’s start with port scanning. Run this command: sudo nmap -A -vv <vulnerable_machine_IP> -oN scan.nmap Here’s a breakdown: We see that…
Before you start, ensure you’ve completed the Introduction to Metasploit lesson. We’re going to hack into a vulnerable Linux machine using Metasploit. We’ll determine which vulnerabilities exist, run exploits, gain access, and become the root user. Start Metasploit and ensure your database is up and running. Then start this machine from TryHackMe. Run the command…
Metasploit describes itself as a “penetration testing framework.” This means that for anything pentesting-related, Metasploit has a tool. We can use it to gather info, gain access, conduct all types of attacks, and even cover our tracks. It has over 2000 exploits for different services and operating systems. It also has 1000+ modules we can…