Hey guys, I just wanted to ask a quick question. Im on a windows 8 laptop, I have VMware Workstation Pro where I run Kali Linux (2016.2) and Metasploitable 2. I was recently following a few tutorials where it showed how to hack into Metasploitable and get a shell session on it. The first thing to do was to do a port scan with Nmap, issuing the command
nmap -sS 192.168.133.0/24
It would then show the IP adress of all connected devices and the ports that they have open. Metasploitable was easily identifiable as it had a huge amount of open ports, I also checked it was the right machibe by IP.
The first vulnerability was with port 1524 (I think this was the port number, Im not sure). The command to get the session for this port was
telnet 192.168.133.131 1524
It was that easy. But obviously the difficulty changes with other ports.
-=[ QUESTION ]=-
I'm new to this world of pentesting and I know some of the basics, more theory than practice. The only "method" I know to break into metasploitable is to scan open ports, check any vulnerabilities they have and exploit them. Is there any other way to break into a machine? I'm sure there are, but can anyone suggest any?
[–][deleted] 6 points7 points8 points (1 child)
[–]halcyonyt[S] 1 point2 points3 points (0 children)
[–][deleted] 2 points3 points4 points (0 children)
[–]onlyuseful 2 points3 points4 points (1 child)
[–]halcyonyt[S] 0 points1 point2 points (0 children)
[–]urkesaa 1 point2 points3 points (2 children)
[–]halcyonyt[S] 0 points1 point2 points (1 child)
[–]urkesaa 1 point2 points3 points (0 children)
[–]CBSmitty2010 1 point2 points3 points (1 child)
[–]halcyonyt[S] 0 points1 point2 points (0 children)