🔬SMTP - MSF Exploit
Lab 1
Target IP:
192.109.36.3Exploit the target with the appropriate Metasploit Framework module
ip -br -c a
service postgresql start && msfconsole -qdb_status
setg RHOSTS 192.109.36.3
setg RHOST 192.109.36.3
workspace -a SMTP_harakaPerform an
nmapscan directly into MSF
db_nmap -sV -O 192.109.36.3

Last updated
Was this helpful?