Member-only story
Blue WriteUp | HackTheBox | Automated Exploitation
Hi everyone ! As I mentioned before, I will also explain and give perspective on automated exploitation which is really enjoying.
Now let’s get start with reconnaissance by using nmap.
1) Reconnaissance
Firstly, I must say that in my initial attempt, perhaps the reasons behind the high demand in network traffic in the CTIS department are unclear. I genuinely did not grasp why my port scans were inadequate in detecting vulnerable parts of the OS. However, I am pleased to report that there were no issues found in my dormitory network. Therefore, enjoy with my write-up :)
- I used same network scan command in my attempt.
sudo nmap -sV -script vuln 10.10.10.40
In order to invoke Metasploit Framework just use:
msfconsole
You most probably encounter with different welcome messages generated by Metasploit Framework. I should say that this is…