This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
metasploit [2019/09/23 20:58] acm [Running the Exploit] |
metasploit [2019/09/23 21:03] (current) acm [Running the Exploit] |
||
---|---|---|---|
Line 75: | Line 75: | ||
[*] Found shell. | [*] Found shell. | ||
[*] Command shell session 1 opened (192.168.0.197: | [*] Command shell session 1 opened (192.168.0.197: | ||
+ | |||
+ | whoami | ||
+ | root | ||
</ | </ | ||
- | This is followed by a blinking cursor, which when we run < | + | As can be seen above when we ran the whoami |
+ | |||
+ | ==== Final Thoughts ==== | ||
+ | There is a ton more that can be done with Metasploit, and this is literally just the tip of the iceberg as far as functionality goes. There are scanners, reverse shells, the Meterpreter shell, and even ways to group your projects and credentials, |