Hopefully you followed along with yesterday's tutorial to setup the Metasploit database on your Kali Linux machine. If not, do it now, because this tutorial is going to expand on that and show you how to connect to a vulnerable machine.
We're going to use a very, very well known yet still wildly available exploit (MS08-67) to connect to our target machine on the network through the Metasploit framework. This video alone should make you want to keep YOUR system up to date with the latest patches and security updates.
LEGAL DISCLAIMER: I am going to be connecting to a system in which I own. For legal purposes, only use this tutorial against your own computer(s) or ones you have explicit permission to exploit. I am not responsible for what you do with this information.
What You Will Need
- Kali Linux (either a bootable LiveCD or bootable USB image)
- Internet connection
- Metasploit Framework (included in Kali Linux and available for Windows)
Connecting to a Target PC Using Metasploit
This tutorial is only a quick summation on the steps needed to connect to a known vulnerable computer. I'll cover later how I found out that this particular computer was vulnerable and what other exploits you might be able to use. Although knowing Linux and DOS commands are not necessarily required to follow along, it does help if you already know your way around a terminal or command prompt.
Now, let's get to the hack: