Network assessment
We've seen in previous chapters that Metasploit's workspace feature can be very useful. In the following engagement, we will make use of it as well. First, we have to launch the console from the terminal using the msfconsole
command. Once Metasploit has finished loading, it will drop us into the familiar msf >
prompt.
root@kali:~# msfconsole
[*] StarTing the Metasploit Framework console...
msf >
As with all engagements involving Metasploit, we start by creating a workspace specifically for the scope:
msf > workspace -a ecorp
[*] Added workspace: ecorp
For this scenario, our target is a black-box API application provided by E Corp. The target host will be api.ecorp.local
.
Before we hammer away at the web interface and try to exploit some obscure vulnerability, let's take a step back and see what other services are exposed on the API's server. The hope here is that while the API itself may have been closely scrutinized by developers, who may...