2.2 Metasploit


Metasploit is quite the expansive tool with many options for exploitation and lots of tools to assist in the exploitation of machines. We used metasploit extensively to run nmap scans, exploit machines using the exploits, and also ran some of the bruteforce tools that come with metasploit. This was a very interesting tool to get to know and use and its power is certainly visible. We mainly used the metasploit command line interface since we were all ssh’ing into the Kali box, but as seen below some group members also explored using Armitage.

results matching ""

    No results matching ""