is metasploit effective when trying to exploit through the web? ive notice it just times out and fails.........if it is not effective, what is?
dude....this is my second post ever. thanks for the tips but you don't have to be inconsiderate. i started doing this recently and have had no help.
I'm not trying to be inconsiderate. That was a tip also. If you've read the forum rules you would know that there are some standards this community is built on. One of them is being determined and willing to learn for yourself (can be accomplished by properly searching the forums).
thats cool....but don't make a newbie section and expect people to not ask questions. i wouldn't have asked if i knew i was going to get ripped on. great community
Newbie Area Welcome to the BackTrack Forums! Please check this section and post to it if you are new to BackTrack, the Forums, or both.
But no where does it say anything about metasploiting the inturwebs.
And no one ripped on you, you were encouraged to take the appropriate action and to search and learn.
May be it's the time to introduce a little quiz BEFORE someone can register here. I'm serious & not kidding at all. I'm sure that we can setup 5 simple questions to welcome new members to the community. Just for example:
1) Which of the following is best option if you have any question?
- A) Ask mum
B) Ask Dad
C) Post it to forum
2) Which of the following is most powerful encryption?
- A) WEP
D) Switching off your computer
Well...... something like these....
If you can't explain it simply, you don't understand it well enough -- Albert Einstein
....derailment in progress....
@dtl666 you aren't on tekroscape are you?
I was tempted to suggest an easter egg hunt through Google.
But then I thought.. why not an essay based upon the Stickies
Nor does it state How to use Linux for people bred on Windows or Macs. That is something that is rather annoying as well.Originally Posted by archangel.amael
Brilliant!Originally Posted by pureh@te
....end of derailment....
Your question was none of these things, and without follow up information it will be impossible for anyone to answer your question in a way that is of any use to you at all.
Let me demonstrate by going back to your original question....
Although this is dependent on:
- whether you are using Metasploit correctly,
- which exploit you are using,
- what your ultimate goal of exploitation is (what you want to do to the target system),
- whether you are using client or server side web exploits,
- whether vulnerable software exists on the target system,
- whether other protection methods are in place between you and the target (firewall, IPS, etc)
- and whether you actually meant "Internet" instead of "Web".
I cant even hazard a guess as to why this is happening until I know what command you used, what system you are targeting, what patches and software are installed on the target system, what error messages you got, whether a firewall is in place between the Metasploit system and the target system, etc, etc
So was that answer helpful?
Maybe instead of complaining about how badly you are being treated here, you should put some more effort into asking questions that can actually be answered, and into reading up about the subject you are supposedly so interested in so you can understand those answers when they get provided to you.