Logo
Overview
Metasploit

Metasploit

anonymous anonymous
July 30, 2025
2 min read
index

1. INTRODUCTION

I completed the Metasploit Fundamentals module. It introduced the basics of the Metasploit Framework—covering modules, targets, payloads, sessions, Meterpreter, and Kiwi.

The module emphasized the role of Metasploit in penetration testing, vulnerability analysis, and exploit development. It also explored debates within the infosec community regarding ethical tool usage and encouraged critical thinking on best practices for newcomers to cybersecurity.

Intro Screenshot


2. MODULES AND TARGETS

Metasploit modules are reusable scripts designed for specific attack vectors. The exercise involved identifying and working with the EternalRomance exploit, specifically targeting older Windows OS versions.

Targets represent system-specific configurations that adapt the chosen exploit to match OS versions or architectures.

Modules
Target Configurations
Exploit Setup
Options Shown
Run Completed


3. PAYLOADS

A payload complements the exploit by executing code after a vulnerability is triggered—typically delivering a reverse shell or Meterpreter session. This module helped me understand how payloads are chained with exploits to establish attacker access.

Payload Configuration
Payload Execution
Payload Result
Reverse Shell


4. SESSIONS

Multiple sessions can be managed simultaneously. Using the background command, I could run modules while maintaining existing connections.

Key Highlights:

  • Figure 1: Examined HTML to identify a vulnerability
    Figure 1

  • Figure 2: Searched the vulnerability in Metasploit
    Figure 2

  • Figure 3: Ran the module
    Figure 3

  • Figure 4: Verified the shell and username
    Figure 4

  • Figure 5: Found a sudo vulnerability
    Figure 5

Additional session screenshots:

Session
Session
Session
Session
Session
Session


5. METERPRETER

Meterpreter is a post-exploitation payload that operates in-memory and offers powerful functionality—file system access, keylogging, webcam control, and more.

Meterpreter 1
Meterpreter 2
Meterpreter 3
Meterpreter 4
Meterpreter 5
Meterpreter 6
Meterpreter 7
Meterpreter 8


6. CONCLUSION

This was another invaluable learning experience. The Metasploit Framework simplifies what would otherwise be complex penetration testing tasks. Being able to connect all I’ve learned from earlier modules—Windows Fundamentals, Linux Fundamentals, and Web Fundamentals—into a cohesive workflow was both exciting and empowering.

Wrap-up Screenshot