We will start our penetration testing process right from msfconsole. So, launch the console and perform a port scan to gather information about the target. We discussed port scanning in detail in the previous chapter. Here, I will assume that you have gathered information about the target system and its services. So, let's proceed with selecting exploits and payloads.
Sometimes, looking at the output of a Nmap or even vulnerability scanners is not enough. The output of the services command just shows us that the server is running a version of Apache:
msf > services -p 8020 192.168.216.10Services========host port proto name state info---- ---- ----- ---- ----- ----192.168.216.10 8020 tcp http open Apache httpdmsf >
There is ...