| Title | Author | Created | Published | Tags | | --------------------------------- | ---------------------------- | ------------- | ------------- | ---------------------------------------------------------------------------------------------------------------------------------- | | Appendix C - Mastering Metasploit | <ul><li>Jon Marien</li></ul> | July 26, 2025 | July 26, 2025 | [[#skillsontario\|#skillsontario]], [[#competitions\|#competitions]], [[#certifications\|#certifications]], [[#classes\|#classes]] | # Task - Lab 10 **CyberQ Appendix C Lab - (Mastering Metasploit Framework)** 1) Capture all flags 2) Complete the following exercises - Exercise 1: Exploring the Metasploit Framework - Exercise 2: Utilities of the Metasploit Framework - Exercise 3: Working with the Metasploit Framework **Output/Report:** 3) Screenshot of finished lab score 4) Screen captures of the following steps from the CyberQ Lab Instructions document. - [Exercise 1: Exploring the Metasploit Framework (Steps: 17, 32)](#Exercise%201%20Exploring%20the%20Metasploit%20Framework%20(Steps%2017,%2032)) - [Exercise 2: Utilities of the Metasploit Framework (Steps: 10, 21, 25, 49)](#Exercise%202%20Utilities%20of%20the%20Metasploit%20Framework%20(Steps%2010,%2021,%2025,%2049)) - [Exercise 3: Working with the Metasploit Framework (Steps: 22, 27, 45)](#Exercise%203%20Working%20with%20the%20Metasploit%20Framework%20(Steps%2022,%2027,%2045)) --- # # Appendix C: Mastering Metasploit Framework --- # Exercise 1: Exploring the Metasploit Framework (Steps: 17, 32) ### Step 17 ![[image-806.png]] ### Step 32 ![[image-807.png]] ## Answer > [!check]- > ![[image-808.png]] > ![[image-809.png]] --- # Exercise 2: Utilities of the Metasploit Framework (Steps: 10, 21, 25, 49) ### Step 10 ![[image-810.png]] ### Step 21 ![[image-811.png]] ### Step 25 ![[image-812.png]] wrong `LHOST`... ![[image-813.png]] For 2008 Server: ![[image-814.png]] For 2016 Server: ![[image-815.png]] ### Step 49 Special module kept failing to keep sessions alive: ![[image-816.png]] Creation of special payload in pdf format then zipped: ![[image-817.png]] ![[image-818.png]] I went to upload it on virustotal, to check, and I had to have done about 20 CAPTCHAs before I gave up...It was not believing I was not a robot. > [!Answer]- > ![[image-819.png]] --- # Exercise 3: Working with the Metasploit Framework (Steps: 22, 27, 45) ![[image-820.png]] ![[image-821.png]] ![[image-822.png]] ![[image-823.png]] ![[image-824.png]] ![[image-825.png]] ### Step 22 ![[image-826.png]] ### Step 27 ![[image-827.png]] Successful! ### Step 45 ![[image-828.png]] --- All done!