Hopefully you followed along with yesterday's tutorial to setup the Metasploit database on your Kali Linux machine. If not, do it now, because this tutorial is going to expand on that and show you how to connect to a vulnerable machine.
We're going to use a very, very well known yet still wildly available exploit (MS08-67) to connect to our target machine on the network through the Metasploit framework. This video alone should make you want to keep YOUR system up to date with the latest patches and security updates.
LEGAL DISCLAIMER: I am going to be connecting to a system in which I own. For legal purposes, only use this tutorial against your own computer(s) or ones you have explicit permission to exploit. I am not ... Continue Reading