Metasploit is a tool that helps the attacker to execute the exploit code against the remote target machine.
It was founded by H.D Moore.

Here are some links to visit: Official Site,Wikipedia.

To know the terminology that we will be using later on (Exploit, Payload, Shellcode,Module,Listener), please google them.

So without any delay, let’s start metasploit! Continue reading

Setting Up the Lab Environment

Setting up a lab is important.This is where you try all your hacks and practice.

Download and install VMware virtualization software.

The attacker (base) operating system will be Kali Linux.

There are many victim operating systems.Some of them are:

Setting up the Attacker machine:

Here’s a good video by Root Project on YouTube.

We will set up the Victim machines when we perform hacks on them in detail.