Metasploit

Click here to view exercise as a PDF instead.

This exercise will introduce the Metasploit tool to test for vulnerabilites in a system.

Metasploit is a network penetration and exploitation tool. It is commonly used to find vulnerabilities and certain information about the network.
In this exercise, you will use Metasploit. When Metasploit is up and running, you will be given an IP address to use with Metasploit and see the output given by the tool.

  1. Learn about the Metasploit software utility
  2. Learn how to identify vulnerabilities

Overview of Part 1 goes here

Content of Part 1.A goes here

Content of Part 1.B goes here

Content of Part 1.C goes here

Overview of Part 2 goes here

Content of Part 2.A goes here

Content of Part 2.B goes here

Content of Part 2.C goes here

Overview of Part 3 goes here

Content of Part 3.A goes here

Content of Part 3.B goes here

Content of Part 3.C goes here

Overview of Part 4 goes here

Content of Part 4.A goes here

Content of Part 4.B goes here

Content of Part 4.C goes here


Creative Commons License
CyberExplorations Exercises by Glenn S. Dardick is licensed under a Creative Commons Attribution 4.0 International License.