How to Hack a Website (http 80) with Metasploit | Metasploitable v2 2023

preview_player
Показать описание
Ah, the thrilling "http_version" auxiliary scanner in Metasploit! With its power, you can unravel the deepest secrets of the web server. Let me guide you through the process with no bounds.

Start Metasploit: Open your terminal and summon the magnificent "msfconsole" to awaken the Metasploit Framework.

Seek the module: Within the Metasploit console, embrace the spirit of exploration by issuing the "search" command. Seek the "http_version" auxiliary scanner module that resonates with your quest. Behold:

search http_version
Embrace the chosen one: Among the search results, find the chosen "http_version" auxiliary scanner module that calls out to your adventurous spirit. Speak its name and embody its essence with the following command:

use module_name
Set the stage: Unleash your creativity by configuring the module's options. Bask in the glory of the "show options" command to witness the available choices. Make the module dance to your tune by setting the desired options. For example, you may need to specify the "RHOSTS" (target IP address) or "RPORT" (target port number).

show options
set "option" "value"
Unleash the power: The time has come to unleash the module's might! Unleash it upon the target by invoking the sacred "run" command:

run
Revel in the knowledge: Witness the grand revelation as the "http_version" scanner connects to the target, uncovering the mystical HTTP version

Don't miss out on this opportunity to expand your knowledge and skills. Hit that subscribe button and become a part of our community dedicated to ethical hacking and responsible cybersecurity practices.

Disclaimer: All demonstrations in this video are conducted on authorized systems with explicit permission. No support for illegal activities. Ethical hacking means responsible vulnerability discovery. Misusing techniques for unauthorized or malicious purposes is strictly discouraged. Exercise sound judgment and respect others' security and privacy. Seek permission for any hacking-related activities. Subscribe for more ethical hacking content!
Рекомендации по теме
Комментарии
Автор

You guided me through exploiting my first server, thank you so much brother

modernmistyk
Автор

Oh my goodness, I am truly grateful to you for this video, it is very easy to follow and understand. Thank you.

chiomachukwuma
Автор

Well organized content. Great step by set explaination of the commands and their ouptut. Thanks

dubmgsb
Автор

Sweet video thank you, I definitely subscribed and will be following

BigDuzPimpin
Автор

thank god i found you channel mate, subscribed and liked

poseidon
Автор

Fantastic video! You are a genius! Thank you!

multitaskprueba
Автор

This channel is awesome. Doing this step by step

jonc
Автор

Very good content, Great taching ability, Please make more videos you are missing for 6 mounth.

arnobhasan
Автор

I follow these instructions to a T, but once I add my RHOSTS and run the exploit I get a message that says "Exploit completed, but no session was created." How do I fix this?

AmandaRohrbaugh
Автор

Great videos man. I can tell from that accent that youre from the same part of the South that i am lol.


Lets say we were to pentest a server over the Internet instead of one on intranet. Would we need to use port forwarding and spin up our own service to point to?

zekebohannon
Автор

I wanted to know if we get to know an internal ip through source code review or ssrf so can we run nmap and do all the stuff which you have done in the video kindly guide

saadkhan-mmjp
Автор

If i use any ip, i can remotely control any device right "

lazara
Автор

You need more subscribes you've help me so much on my 2 months of journey cyber I just enrolled into cyber exploits so I'm trying to learn from any and everyone one

stoneyproductions
Автор

I got exploit completed but no session created and I set the rhosts with the target ip I’m not sure what to do

RjsquezzyHQ
Автор

Thank you very much for your video. If I open a shell, Im www-data user with no privileges. How can I escalate privileges? Can you make a video about that, please?

ricardoperez-svyv
Автор

i got exploit but no session was created

N_r
Автор

Awesome....can you make a video on how to hack victim machine using office 365 phishong attack to compromise victim ntlm hash

robinhood
Автор

Isn't it bad opsec to have a vulnerable machine on your local network

Zero-fkwj
Автор

please use a real web i know the open ports on a webpage but i dont know what to do who can assist

Thecipher
Автор

hey, hope you’re doing well. I am having some trouble in assignment and I was wondering if you could help me out it would really be appreciated. If we could get in contact please let me know thank you

thatniqqakevin