Zymaly
Programming Language Evangelist
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
400 XP

Hey Folks, In our previous article we showed all the configuration and installation of the Metasploit tool, but in this article we will give you a brief description of the main features of this tool, which named is “Quite Pentest“. Basically this feature of this tool gives us a great facility through which we can find critical, low and medium types of vulnerabilities on the target machine or server as well as we can get more things such as open ports, credentials and exploits.
Let’s take a look

Metasploit Login Details
So first of all we will login again into metasploit pro framework with our created credentials.

Good


Start


Done


Results


As we told you that this tool can be useful for corporate use as it provides us with everything like full details of vulnerability and mitigation etc.

Metasploit Exploits
Great


Plaintext Password
Sometimes the running services’ passwords are plain, which is why it automatically displays all passwords.

Active Service
We can view all active, closed and filter services running on the target machine or web server as well as their brief information.

Disclosed Vulnerability
As you can see the target host is completely vulnerable to both of these vulnerabilities, allowing us to directly obtain the target machine’s meterpreter session and control it remotely.

Download Output
To download its result, it provides us with different 2 formats which you can choose according to your own.

Metasploit Exploitation
Let us move towards exploitation. Just click on the exploit tab and look further.

Hmm


Done


Metasploit Sessions
In this tab we can see all active and closed sessions and also you can control it by clicking on active session.

After clicking on the active session we get the following options to control the remote machine.

Collect System Data
Entire folders, files and more sensitive things that we can view and download directly through the GUI interface.

CMD Shell
It also allowing us to use meterpreter shell directly by use the cmd shell option. After get the meterpreter shell then we can execute the available command.

Credentials Management
In this section you can see all previous and upcoming credentials.

Brute Forcing
In the same section we get brute force facility to crack the login of services running on the target server or machine. Just click on it.

Create Dictionary
Now we need to create a dictionary file according to the tool. You can set all the usernames and passwords one by one by giving a space between them.

After creating the dictionary simply come back to the tool and enter the target address, select services and import the dictionary file created.

OMG


Done


