You mentioned that this will be the last Meta2 video, so do you plan on doing a series on Metasploitable3 as well?
@mrchism78975 ай бұрын
Am I to assume that this method is a replacement for Metasploit brute force attack? I followed the steps successfully and I see the results but back in Metasploit ii is the same as it ever was.
@ONTISecurity5 ай бұрын
Micheal, thanks for engaging. Means a lot. For now I have opted for this as a replacement for Metasploit because it clearly is more consistent than Metasploit. I however, cannot say with absolute certainty that this method the definite replacemnent. It was just for this scenario and for future bruteforcing incase Metasploit fails again. So this is essentially a backup. As far as brute forcing multiple IPs, I suppose you could try insterting the IP addresses in a sequence (one IP followed by another, no comma, just a space between the addresses) in the host arguments. I have not attempted to do this yet because the need has not arisen and also because I was only working with one IP at that point in time.I also assumed it would take a LOT of time. A lot more time than just opening up a few terminals and designating each terminal for each IP. I hope that helps.
@mrchism78975 ай бұрын
@@ONTISecurity Have you compiled a list of Meatasploit auxiliaries or modules that do work as intended?
@ONTISecurity5 ай бұрын
@@mrchism7897 No I haven't. Not yet at least. I mentioned you could open tabs individually but I also forgot to mention that you could use a range of IPs you're looking to target. An example would look like this nmap -sS -T4 -script=all -p 3306 192.168.0/24 This would be much more efficient than scanning target IPs individually.Don't know why I forgot to mention this.
@mrchism78975 ай бұрын
Thanks for this. I finally got the the point of getting login info for mysql but have not yet tried the brute force. I have a question about that. I sometimes attack multiple ip's at once, so do I need to follow this procedure for all ip's used or do I have to attack one at a time? Great work, and thank you for this. Michael