JoJoCal19 wrote: » Thanks for posting your progress aakashc1! One question I have, how do you manually exploit machines? I've always read about people exploiting the machines with Metasploit and then going back and doing it manually. However when I ask how one does manual exploitation, I don't get a good explanation lol. So are you able to give an example of you do a manual exploit, without naming any machines?
jortjr wrote: » How did you like pentesterlab.com pro? Was the cost worth it?
gphalpin wrote: » Thanks for posting. I'm also taking the Offensive Security Kali Linux Pen Testing class and labs. I've been so busy with late nights at work that I got sidetracked. I have many years IT experience but no previous pen testing experience. I finished the videos and have worked along with my test VM. Now that it's my time to start hacking, I don't even know where to begin. The class is all a big blur to me now...event though I have lots of notes. I've scanned via nmap and got a list of all the lab IPs that are up. I've also scanned the top 20 ports of all the systems. I've tried Metasploit but when I try the command: show auxilary, I get an error. It's been one problem after another. I'm going back to review my notes to see where to begin over. I'd appreciate any help getting me on track. Thanks.