From the course: Metasploit Essential Training
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Launching an attack
From the course: Metasploit Essential Training
Launching an attack
- [Voice Over] Now of course, once you've connected to a target as in let's say a Windows machine here, that's all you've done is just connected. Though you were able to somehow connect, maybe an exploit was used et cetera, to get that remote connection, you're not actually doing anything with that environment. You are simply just connecting to it. The next phase is to, obviously, launch an attack or to do further investigation. Or to execute other commands on top of that to get to the objective or complete the objective that you have for that target system. So obviously, we connected previously, so let me just go back into here and we'll just type "sessions". We can see I have an existing session. So we are going to enter that session. So "session 5". So I'm back at my meterpreter prompt. The first thing we can do here is use a command such as "sysinfo", which will give me specific information around the system itself.…