Now this exploit for my rig was a little hard just because I do not have the most RAM and it required slightly more than the others. So I took less screenshots This again is the same step as the others. Figuring out what ports were available Here we are using "ffuf" again Now I believe this is the first time we used "dnsrecon" And here we add the dns to our machine so we can perform the attack Follow me at LinkedIn or Twitter
So In this I am going to show how I used metasploit to gain access to a machine we set up. Remember this is my first exploit so if you are looking for advanced techniques this is not the post for you. One thing I have learned so far that I believe is an advantage to me is that you need to do a lot of research. And why I think that's an advantage is because the company I started originally was designed to do research to find programs to help veteran business owners succeed, based on their demographics. This gave me a lot of experience in google search for one and for another thing I chose to do that because I actually enjoy the hunt of google. Getting lost in searches I don't know why I enjoy it, maybe because it gives me a chance to hyperfocus on something, I don't know. But anyways I am going to show some pictures on how I did it. I understand some think I go overboard on pictures but remember this blog is partially a note taking thing for me. I am using this as a way for ...
So we touched on Sockets on briefly, but we built our first port scanner. Now I decided to try both the 50-85 like the lesson taught then I went back and scanned all of them just out of curiosity. Let me tell you it took a while with as little processing power as my laptop has. But it was a fun lesson. Socket above and Hydra Below Then below here is my first port scanner Feel Free to reach out on LinkedIn or Twitter
Comments
Post a Comment