Member-only story

System Hacking

Raviteja Mureboina
3 min readAug 12, 2022

System Hacking

System hacking is the process of trying to compromise the target system with the help of the information we collect from the pre-attack phases (Footprinting and scanning).

Metasploit

Metasploit is a Framework used for developing and executing exploit code against a remote target machine. Metasploit Framework contains following modules

● Exploits

● Payloads

● Auxiliary

● Encoders

● Post

● Nop’s

Components of the Metasploit:

● Msfconsole

● Msfvenom

● Armitage

Exploit

Exploits can help gain superuser-level access to a computer system. Hackers manage to gain low-level access; then they try to escalate privileges to the highest level (root). The exploit becomes unusable; once the vulnerability is fixed through a patch.

Exploits are Classified based on how the exploit communicates with the vulnerable software.

● A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system.

--

--

Raviteja Mureboina
Raviteja Mureboina

Written by Raviteja Mureboina

Hello Everyone, I write blogs on Cybersecurity, ML, and Cloud(AWS, Azure, GCP). please follow to stay updated https://www.youtube.com/c/RaviTejaMureboina

No responses yet