Lab 10 for Cyber Range

docx

School

Renton Technical College *

*We aren’t endorsed by this school

Course

436

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

7

Uploaded by MagistratePencil8798

Report
Lab 10 for Cyber Range Part 1 -- Exploring Metasploit Seeking to Become Familiar with it: The invocation #show exploits resulted in the following: The invocation #search -t exploit -r great smb resulted in the following:
#whoami invocation displays the current user Unsure of what #ls /opt is meant to display. #ls lists computers files and directories within the OS but “Microsoft” is generic.
#cat /etc/group displays the groups that belong to a user. In this case, those that belong to remote.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Part 2 -- Discovering which Metasploit Exploit to Use for Cyber Attacks: Step 1: #sudo nmap -T4 -Pn -p1 -65535 -v 172.25.25.239
Step 2: #sudo nmap -sC -sV -p6697 172.25.25.239 Step 3: As far as vulnerabilities go, it appears port 6697/ tcp under the irc service/ UnrealIRCd version is open. Step 4: #search cve CVE-2010-2075 shows a current “excellent” exploit. “This exploit should never crash the target system.” Part 3 -- Using this Exploit To Attack your Metasploitable VM: Step 1: Step 2:
Step 3: Step 4: Step 5: Step 6: Step 7:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Using the following invocations: #whoami #dir #pwd #cat /etc/group, I am now asking the pwnded Metasploitable v3 with these commands as seen by the Star Wars references.