Finding vulnerabilities with Metasploit

Bernardo Rocha
3 min readFeb 3, 2021

--

The following article was written for college purposes.

What is Metasploit?

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7.

Its best-known sub-project is the open-source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

Finding vulnerabilities

Mapping the network

First let’s use nmap to map our network. After you find your IP address I went to metasploit and typed:

db_nmap 192.168.24.0/24

This command will store the hosts found by the nmap.

nmap

Hosts found

As you can see the nmap foun a couple of hosts up:

hosts

Just type hosts to check this out.

Services up

The next step is to find which services are up and what ports are they using. You can gather this information by using the following command:

services
services

Vulnerabilities found

Now you are able to find any vulnerabilities. Using the command:

vulns

In my case the metasploit didn’t found nothing to work with. As you can see:

vulnerabilities

In this tutorial, it was possible to find some vulnerabilities as you can see:

Screenshot from this tutorial

And after they find weaknesses, was time to exploit them:

Screenshot from this tutorial

The command they have used explores the vulnerabilities in the port 3306 (-p) and the service mysql (-s). Also the -i returns the information about the vulnerability.

Screenshot from this tutorial

--

--

Bernardo Rocha
Bernardo Rocha

Written by Bernardo Rocha

Cybersecuity student at Guarda, Portugal.

No responses yet