Professional Documents
Culture Documents
It Sec Worksheet - 3
It Sec Worksheet - 3
2. Steps/commands
Step1- greeting
screen of MSF
Screenshot-
Step2-
? command
Brief info-
This is used to show the list of possible commands
Screenshot-
Step3-
show exploits command
Brief info-
This is used to show the list of devices that can be exploited with their current status
Screenshot-
Step4-
use exploit <module name> command
Brief info-
This is used to use exploit on the given module name.
Screenshot-
Brief info-
This is used to show the present payloads in the module name.
Step5-
Screenshot-
Step6-
set payload<compatible payload name> command
Brief info-
This is used to set a specific payload
Screenshot-
Brief info-
This is used to show the options present in the selected payload
Step7-
Screenshot-
Brief info-
This is used set the ip address of the rhost.
Screenshot-
Step9- show targets
command
Brief info-
This is used to show the present targets
Screenshot-
Step10-
set target 0
Brief info-
This is used to choose a target
Step9-
Screenshot-
Step11-
Exploit command
Brief info-
This is the final command which is used to exploit the target.
Screenshot-
Evaluation Grid (To be created as per the SOP and Assessment guidelines by the faculty):
Sr. No. Parameters Marks Obtained Maximum Marks
1.
2.
3.