Thm Metasploit

THM - Metasploit Cheatsheet

https://tryhackme.com/room/rpmetasploit

Useful Commands

Modules

Metasploit consists of six modules:

THM%20Metasploit/module_diagram.png

Note, this diagram includes both the interfaces and *most of the modules. This diagram does not include the ‘Post’ module.*

Using Metasploit

Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server.

RDP allows network administrators to remotely diagnose and resolve problems individual subscribers encounter. RDP is available for most versions of the Windows operating system. RDP for Apple macOS is also an option. An open source version is available, as well.

Note: Pivoting is a technique to get inside an unreachable network with help of pivot (center point). In simple words, it is an attack through which an attacker can exploit that system which belongs to the different network. For this attack, the attacker needs to exploit the main server that helps the attacker to add himself inside its local network and then the attacker will able to target the client system for the attack.

Once we’ve started a socks server we can modify our /etc/proxychains.conf file to include our new server. We need to prefix our commands with proxychains (outside of Metasploit) to run them through our socks4a server with proxychains.

More info about meterpreter: https://www.offensive-security.com/metasploit-unleashed/meterpreter-basics/

Contact

If you have any questions or remarks don’t hesitate to reach out on discord to therokdaba#9872.

Go back to the homepage of this website.