Metasploit
Click here to view exercise as a PDF instead.
This exercise will introduce the Metasploit tool to test for vulnerabilites in a system.
Metasploit is a network penetration and exploitation tool. It is commonly used to find vulnerabilities and certain information about the network.
In this exercise, you will use Metasploit. When Metasploit is up and running, you will be given an IP address to use with Metasploit and see the output given by the tool.
- Learn about the Metasploit software utility
- Learn how to identify vulnerabilities
Overview of Part 1 goes here
Content of Part 1.A goes here
Content of Part 1.B goes here
Content of Part 1.C goes here
Overview of Part 2 goes here
Content of Part 2.A goes here
Content of Part 2.B goes here
Content of Part 2.C goes here
Overview of Part 3 goes here
Content of Part 3.A goes here
Content of Part 3.B goes here
Content of Part 3.C goes here
Overview of Part 4 goes here
Content of Part 4.A goes here
Content of Part 4.B goes here
Content of Part 4.C goes here
CyberExplorations Exercises by Glenn S. Dardick is licensed under a Creative Commons Attribution 4.0 International License.