Metasploit basics challenge

Hi, I’m currently stuck on this challenge and I don’t understand what I’m supposed to get from the web service, can someone please advice.

This challenge is very similar to the lab:

1.) Close and restart Metasploit, best to start clean
2.) In Metasploit, run an nmap scan as instructed to discover a web server and a web service

Our focus is on the web service. Nmap will not tell us the version, but there is a huge hint on finding it using some other tool (not Metasploit). How do we visit a website? (Hint, you are using one right now to do this lab.)

4.) In Metasploit, search for the web service found and use an exploit matching the version. This will give you a meterpreter shell (no need to upgrade)
6.) Leverage the meterpreter session to suggest a local exploit like you did in the guided exercises.
7.) Use and run the suggested exploit
8.) Search for the flag, and cat the flag.

1st question: just simply run the command <firefox 172.19.0.3:80>

2nd question: run the command <search <that particular module name from question 1> >

3rd question: Use that module and do all the settings as told , run once , then follow the guided exercise part 2 number 9 to the end

1st question: That or just open Firefox and visit 172.19.0.3 :slight_smile:

2nd question:

3rd question: Use that module and do all the settings as told , run once , then follow the guided exercise part 2 number 9 to the end

Looks right :slight_smile:

1 Like

Thank you for the help, was very useful. I got confused and instead of looking for the actual web service I was looking into the one we didn’t have a version available and from there I went down the spiral. I struggled a bit getting a session but found out where I missed. Thanks again for your help. I completed the challenge :slight_smile:

2 Likes