If you can see this check that
Exploitation using the Metasploit Framework (MSF) |
Authors: Rich Macfarlane, Gordon Russell
This practical runs a Windows XP target, which we can then use to explore the many features of the Metasploit framework. Due to the complexities of the framework, "check button" tutorials were proving to be quite challenging, so we are using pdf tutorials. However this tutorial starts the lab ready for the practical to then be completed in the linuxzoo vitual environment. Start your Kali Linux machine, and then you can boot the target below.To reset all the check buttons from a previous attempt click here
Centos 7 intro: | Paths | BasicShell | Search |
Linux tutorials: | intro1 intro2 wildcard permission pipe vi essential admin net SELinux1 SELinux2 fwall DNS diag Apache1 Apache2 log Mail |
Caine 10.0: | Essentials | Basic | Search | Acquisition | SysIntro | grep | MBR | GPT | FAT | NTFS | FRMeta | FRTools | Browser | Mock Exam | |
Caine 13.0: | Essentials | Basic | Search | |
CPD: | Cygwin | Paths | Files and head/tail | Find and regex | Sort | Log Analysis |
Kali: | 1a | 1b | 1c | 2 | 3 | 4a | 4b | 5 | 6 | 7a | 8a | 8b | 9 | 10 | |
Kali 2020-4: | 1a | 1b | 1c | 2 | 3 | 4a | 4b | 5 | 6 | 7 | 8a | 8b | 9 | 10 | |
Useful: | Quiz | Forums | Privacy Policy | Terms and Conditions |
Linuxzoo created by Gordon Russell.
@ Copyright 2004-2024 Edinburgh Napier University