Skip to content

Commit a341cc2

Browse files
Update README.md
1 parent fd3d7b7 commit a341cc2

1 file changed

Lines changed: 24 additions & 0 deletions

File tree

14 - Summary/README.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1 +1,25 @@
11
# What We Learnt ?
2+
3+
## Metasploit Inrtoduction
4+
5+
- Metasploit is a powerful tool that facilitates the exploitation process. The exploitation process comprises three main steps; *finding the exploit*, *customizing the exploit*, and *exploiting the vulnerable service*.
6+
7+
- Metasploit provides many modules that you can use for each step of the exploitation process. Through this repo, we have seen the basic components of Metasploit and their respective use.
8+
9+
- We also had used the `ms17_010_eternalblue` exploit to gain access to the target machine.
10+
11+
## Metasploit : Exploitation
12+
13+
- You should now have a better understanding of how Metasploit can help you identify potential vulnerabilities on target systems and exploit these vulnerabilities.
14+
15+
- You have also seen how the database feature can help you with penetration testing engagements where you have multiple potential targets.
16+
17+
- Finally, you should have gained some experience with msfvenom and the creation of stand-alone Meterpreter payloads.
18+
19+
- This is especially helpful in situations where you can upload a file to the target system or have the ability to download files to the target system.
20+
21+
## Metasploit : Meterpreter
22+
23+
- Meterpreter is a powerful tool that offers a lot of easy to use features during the post-exploitation phase.
24+
25+
- We have seen how in-memory payloads can be used for post-exploitation.

0 commit comments

Comments
 (0)