From charlesreid1

Basics

In this page we'll walk through a forensic memory dump, run from the Metasploitable machine.

Start by finding the machine with nmap:

# nmap -F 192.168.1.*

Next, utilize an exploit to obtain a Meterpreter shell.

For example, we can use the Metasploitable/Postgres exploit.



Flags