| Title | Author | Created | Published | Tags |
| --------------------------------- | ---------------------------- | ------------- | ------------- | ---------------------------------------------------------------------------------------------------------------------------------- |
| Appendix C - Mastering Metasploit | <ul><li>Jon Marien</li></ul> | July 26, 2025 | July 26, 2025 | [[#skillsontario\|#skillsontario]], [[#competitions\|#competitions]], [[#certifications\|#certifications]], [[#classes\|#classes]] |
# Task - Lab 10
**CyberQ Appendix C Lab - (Mastering Metasploit Framework)**
1) Capture all flags
2) Complete the following exercises
- Exercise 1: Exploring the Metasploit Framework
- Exercise 2: Utilities of the Metasploit Framework
- Exercise 3: Working with the Metasploit Framework
**Output/Report:**
3) Screenshot of finished lab score
4) Screen captures of the following steps from the CyberQ Lab Instructions document.
- [Exercise 1: Exploring the Metasploit Framework (Steps: 17, 32)](#Exercise%201%20Exploring%20the%20Metasploit%20Framework%20(Steps%2017,%2032))
- [Exercise 2: Utilities of the Metasploit Framework (Steps: 10, 21, 25, 49)](#Exercise%202%20Utilities%20of%20the%20Metasploit%20Framework%20(Steps%2010,%2021,%2025,%2049))
- [Exercise 3: Working with the Metasploit Framework (Steps: 22, 27, 45)](#Exercise%203%20Working%20with%20the%20Metasploit%20Framework%20(Steps%2022,%2027,%2045))
---
# # Appendix C: Mastering Metasploit Framework
---
# Exercise 1: Exploring the Metasploit Framework (Steps: 17, 32)
### Step 17
![[image-806.png]]
### Step 32
![[image-807.png]]
## Answer
> [!check]-
> ![[image-808.png]]
> ![[image-809.png]]
---
# Exercise 2: Utilities of the Metasploit Framework (Steps: 10, 21, 25, 49)
### Step 10
![[image-810.png]]
### Step 21
![[image-811.png]]
### Step 25
![[image-812.png]]
wrong `LHOST`...
![[image-813.png]]
For 2008 Server:
![[image-814.png]]
For 2016 Server:
![[image-815.png]]
### Step 49
Special module kept failing to keep sessions alive:
![[image-816.png]]
Creation of special payload in pdf format then zipped:
![[image-817.png]]
![[image-818.png]]
I went to upload it on virustotal, to check, and I had to have done about 20 CAPTCHAs before I gave up...It was not believing I was not a robot.
> [!Answer]-
> ![[image-819.png]]
---
# Exercise 3: Working with the Metasploit Framework (Steps: 22, 27, 45)
![[image-820.png]]
![[image-821.png]]
![[image-822.png]]
![[image-823.png]]
![[image-824.png]]
![[image-825.png]]
### Step 22
![[image-826.png]]
### Step 27
![[image-827.png]]
Successful!
### Step 45
![[image-828.png]]
---
All done!