1 00:00:00,850 --> 00:00:03,060 ‫So let's start up a Metro picture session. 2 00:00:06,110 --> 00:00:09,740 ‫Go to Carly, open a terminal screen and run massive console. 3 00:00:14,940 --> 00:00:16,860 ‫Let's exploit Metasploit about once again. 4 00:00:17,930 --> 00:00:22,100 ‫Using the Java Army server, insecure default config vulnerability. 5 00:00:23,400 --> 00:00:28,860 ‫Now, because we have seen all these before, I want to keep a quick search and use the exploit. 6 00:00:33,430 --> 00:00:37,870 ‫And now is the time to choose the payload type, show payloads. 7 00:00:38,110 --> 00:00:44,890 ‫See the available payload and here are a couple of material payloads I want to use Java Interpreter 8 00:00:44,890 --> 00:00:47,260 ‫Reverse TCP, for this example. 9 00:00:47,260 --> 00:00:54,250 ‫So I use the set payload Metasploit Framework Command with the payload name type show options to see 10 00:00:54,250 --> 00:00:55,420 ‫the options to set. 11 00:00:56,320 --> 00:00:58,960 ‫First, the module options, which we already know. 12 00:01:00,170 --> 00:01:01,070 ‫Said our host. 13 00:01:03,110 --> 00:01:03,920 ‫Supposed. 14 00:01:08,050 --> 00:01:11,020 ‫Leave the airport and support as it is. 15 00:01:11,770 --> 00:01:17,950 ‫And now here the options of the interpreter reverse TCP payload and as you see, they're not different 16 00:01:17,950 --> 00:01:19,900 ‫from the reverse shell payloads options. 17 00:01:20,800 --> 00:01:27,580 ‫So because it's a reverse connection, it requires the listeners and the listener, Port said. 18 00:01:27,580 --> 00:01:29,950 ‫The El host is our Cali and airport. 19 00:01:30,460 --> 00:01:34,660 ‫If you'd like to change, I don't need to change it, so I'll just leave it there. 20 00:01:35,830 --> 00:01:38,020 ‫And now type exploit to run the export. 21 00:01:41,130 --> 00:01:41,790 ‫It succeeded. 22 00:01:42,480 --> 00:01:51,120 ‫We have three interpreter sessions now use Sessions L to list the active sessions and Sessions I with 23 00:01:51,120 --> 00:01:53,940 ‫the idea of the session that we want to interact with. 24 00:01:55,190 --> 00:01:57,530 ‫Now we have an interpreter session. 25 00:01:57,860 --> 00:01:58,850 ‫Congratulations. 26 00:01:59,480 --> 00:02:06,620 ‫So I want to run one of them interpreter sessions now, so this info to check if I exploited the correct 27 00:02:06,620 --> 00:02:07,010 ‫system. 28 00:02:07,980 --> 00:02:09,480 ‫And there it is, yes. 29 00:02:09,900 --> 00:02:11,100 ‫I'm in Metasploit.