
Next, after being greeted by the welcome banner for msfconsole, we can find the appropriate module with the search command. Here is the command I use to update: ~$ sudo apt update & sudo apt dist-upgrade It's always a good idea to stay updated in order to take advantage of the latest exploits and tools. You should see "msf" appear, though, for me, it's "msf5" since I'm using the most recent version, Metasploit 5, which can be upgraded by running the latest version of Kali. Metasploit tip: Use help to learn more about any command Now, we can fire up Metasploit by typing msfconsole in the terminal. First, start the PostgreSQL database with the following command. The first method we will try out today involves one of Metasploit's auxiliary scanners. It would be a waste of time if this was closed or not running at all. Nmap done: 1 IP address (1 host up) scanned in 13.33 secondsĪbove, we can see that port 22 is open and the SSH service is running on it. MAC Address: 08:00:27:77:62:6C (Oracle VirtualBox virtual NIC) Instead of scanning all the default ports, we can specify a single port number with the -p flag. We can perform a simple Nmap scan to see if it is open or not. There are a few methods of performing an SSH brute-force attack that will ultimately lead to the discovery of valid login credentials.īefore we begin any brute-force attacks, we need to determine the state of the port that SSH is running on. One of the most reliable ways to gain SSH access to servers is by brute-forcing credentials. SSH is one of the most common protocols in use in modern IT infrastructures, and because of this, it can be a valuable attack vector for hackers.
