From the course: Metasploit Essential Training

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Launching an attack

Launching an attack

- [Voice Over] Now of course, once you've connected to a target as in let's say a Windows machine here, that's all you've done is just connected. Though you were able to somehow connect, maybe an exploit was used et cetera, to get that remote connection, you're not actually doing anything with that environment. You are simply just connecting to it. The next phase is to, obviously, launch an attack or to do further investigation. Or to execute other commands on top of that to get to the objective or complete the objective that you have for that target system. So obviously, we connected previously, so let me just go back into here and we'll just type "sessions". We can see I have an existing session. So we are going to enter that session. So "session 5". So I'm back at my meterpreter prompt. The first thing we can do here is use a command such as "sysinfo", which will give me specific information around the system itself.…

Contents