🔬SSH - MSF Exploit
Lab 1
Target IP:
192.66.211.3Exploit the target with the appropriate Metasploit Framework module
ip -br -c a
service postgresql start && msfconsole -qdb_status
setg RHOSTS 192.66.211.3
setg RHOST 192.66.211.3
workspace -a libsshPerform an
nmapscan directly into MSF
db_nmap -sS -sV -O 192.66.211.3

Enumerate some information

Shell to
Meterpreterpost exploitation

Last updated
Was this helpful?