BLUE

.docx
School
Culver City High**We aren't endorsed by this school
Course
MATH STATISTICS
Subject
Electrical Engineering
Date
Dec 28, 2024
Pages
4
Uploaded by MagistrateTitanium15776
1.How many ports are open with a port number under 1000?Ans:- 32.What is this machine vulnerable to? (Answer in the form of: ms??-???, ex: ms08-067)Ans- ms17-010
Background image
3.Find the exploitation code we will run against the machine. What is the full path of thecode? (Ex: exploit/........)Ans- exploit/windows/smb/ms17_010_eternalblue4.Show options and set the one required value. What is the name of this value? (All capsfor submission)Ans- RHOSTS
Background image
5.If you haven't already, background the previously gained shell (CTRL + Z). Research online how to convert a shell to meterpreter shell in metasploit. What is the name of the post module we will use? (Exact path, similar to the exploit we previously selected)Ans- post/multi/manage/shell_to_meterpreter6.Select this (use MODULE_PATH). Show options, what option are we required to change?Ans- SESSION
Background image
7.
Background image