At the end of this lab students will be able to setup and utilize
the Metasploit Framework for writing, testing, and using exploit
The student will have completed requisite reading. The student
will require paper for notes and should be prepared to discuss
the exercises upon completion. Students should also have a
basic understanding of the command line in a Windows
Before class, the instructor or a lab assistant will ensure that a
requisite Windows operating system (NT 4.0, 2000, XP, or
2003) is installed on the student computers. Optionally, the
students could have access to a vulnerable (un-patched)
computer in the lab. If this method is used, ensure that the
student knows the IP address of the target machine for Step 4
below. The instructor or lab assistant should also ensure that
the latest version of Metasploit is available for students. This
may be found at
Ideally, this lab should be performed with computers in a classroom
on their own switch, as not to disrupt a normal operating network.
Students should attempt to \u201cdo no harm\u201d to their targets, only test
them for vulnerabilities.
The Metasploit Framework is an environment utilized to write, test,
and execute exploit code. It was developed to provide penetration
testing on subject computers, as well as vulnerability research.
Several new exploit modules have been developed since the release
of version 2.2, and are available for download from the Metasploit
site. For penetration testers, Metasploit is proving to be an invaluable
tool. The framework is provided completely free of charge to users.
The framework has been tested stable with four primary platforms;
Linux, BSD, MacOS X, and Windows NT. A \u201cUser\u2019s Guide\u201d is also
available from the Metasploit site.
Now bringing you back...
Does that email address look wrong? Try again with a different email.