- Scanning: Utilized Nmap and Nessus to perform detailed vulnerability scans on a Metasploit2 instance, identifying potential security weaknesses.
- Exploitation: Leveraged msfconsole within the Metasploit framework to exploit identified vulnerabilities, showcasing practical penetration testing techniques.
The repository includes all relevant scan reports, and exploitation steps, providing a hands-on example of the vulnerability management lifecycle and practical exploitation methods.
- Nmap
- Nessus
- Metasploit 2
- msfconsole
- VMware Workstation
- Kali
Made sure my VMware Work Station was installed, configured, and ready:
Checked Metasploit 2 for IP address:
Performed an Nmap scan on Metasploit 2 to discover open ports for potential exploits:
Conducted another Nessus scan to discover and confirm the vulnerability for exploitation. Chose "UnreallRcd Backdoor Detection" for exploitation:
Launched msfconsole and selected the vulnerability to exploit:
Set the target for exploit:
Exploit Successful: