Week 6 - Forum Week, Vulnerability Exploitation using Metasploit
As always, any tools, techniques, and concepts shared on this blog are strictly for educational purposes. I am not responsible for any misuse of the information or tools discussed here. All practical exercises were conducted on authorized target domains. We've spent the last few weeks footprinting, scanning, and enumerating targets. This week, we finally moved into the actual exploitation phase. For our assignment, we had to review some practical demonstrations of exploitation, specifically watching The Ultimate Metasploit Tutorial! by Hacker Joe and a Metasploit Hacking Demo featuring David Bombal. After going through the demos, I had to write up my understanding of the core concepts. Here are my submitted notes for the week: 1. What is Metasploit? Metasploit is a core tool used in cybersecurity to test how secure a system or network actually is. It helps security professionals find weaknesses by simulating real cyberattacks in a safe and controlled way. Basically, it’s...