{"id":69,"date":"2026-02-12T02:25:34","date_gmt":"2026-02-12T02:25:34","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=69"},"modified":"2026-03-08T00:58:16","modified_gmt":"2026-03-08T00:58:16","slug":"related-courses","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/academics\/related-courses\/","title":{"rendered":"Ethical Hacking and Exploitation with Metasploit"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Skill 3 <\/h2>\n\n\n\n<p>This artifact demonstrates my ability to perform ethical hacking techniques and analyze system vulnerabilities using penetration testing tools. In this assignment, I conducted reconnaissance and exploitation activities on several virtual machines in a controlled lab environment using tools such as\u00a0Nmap and Metasploit. The goal of the exercise was to identify vulnerabilities and understand how attackers may exploit them to gain unauthorized access to systems.<\/p>\n\n\n\n<p>The process began with network reconnaissance using\u00a0Nmap\u00a0to scan the subnet and identify open ports and services. This allowed me to locate systems with exposed services such as\u00a0SMB on port 445, which is commonly targeted in network attacks. Once the vulnerable services were identified, I used the\u00a0Metasploit Framework\u00a0to launch exploits against the target machines. For example, I successfully exploited a Windows XP system using the\u00a0ms08_067_netapi vulnerability, which allowed me to establish a Meterpreter session and execute commands on the compromised system.\u00a0<\/p>\n\n\n\n<p>After gaining access, I performed several post-exploitation tasks, including capturing screenshots, retrieving system information, identifying the system SID, and uploading files to the target machine. These steps demonstrate how attackers can maintain access and gather information after successfully exploiting a vulnerability.\u00a0<\/p>\n\n\n\n<p>This artifact highlights my developing skills in\u00a0penetration testing, vulnerability exploitation, and post-exploitation analysis, while reinforcing the importance of identifying and mitigating system vulnerabilities before they can be exploited.<\/p>\n\n\n\n<p><strong>Artifacts <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"606\" src=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-7.png\" alt=\"\" class=\"wp-image-259\" srcset=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-7.png 936w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-7-300x194.png 300w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-7-768x497.png 768w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-7-463x300.png 463w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/><\/a><\/figure>\n\n\n\n<p>Figure showing the Launching of  Metasploit framework. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"558\" src=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-8.png\" alt=\"\" class=\"wp-image-260\" srcset=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-8.png 936w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-8-300x179.png 300w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-8-768x458.png 768w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-8-503x300.png 503w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/><\/a><\/figure>\n\n\n\n<p>Figure showing the use of ms08_067_netapi as the exploit module and set meterpreter reverse_tcp as the payload.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-9.png\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"606\" src=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-9.png\" alt=\"\" class=\"wp-image-261\" style=\"width:822px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-9.png 936w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-9-300x194.png 300w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-9-768x497.png 768w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-9-463x300.png 463w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/><\/a><\/figure>\n\n\n\n<p>Figure showing the setting of  the rhosts, lhost, and lport with set commands.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-10.png\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"606\" src=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-10.png\" alt=\"\" class=\"wp-image-262\" srcset=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-10.png 936w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-10-300x194.png 300w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-10-768x497.png 768w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-10-463x300.png 463w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/><\/a><\/figure>\n\n\n\n<p>Figure showing Successfull exploitation and establishing of  a session.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-11.png\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"606\" src=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-11.png\" alt=\"\" class=\"wp-image-263\" srcset=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-11.png 936w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-11-300x194.png 300w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-11-768x497.png 768w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-11-463x300.png 463w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/><\/a><\/figure>\n\n\n\n<p>Figure showing the screenshot command being used to take a screenshot of the target machine if the exploit is successful.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-12.png\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"606\" src=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-12.png\" alt=\"\" class=\"wp-image-264\" srcset=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-12.png 936w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-12-300x194.png 300w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-12-768x497.png 768w, https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/image-12-463x300.png 463w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/><\/a><\/figure>\n\n\n\n<p>Image showing a screenshot of the Target screen. Exploitation successful!!!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Skill 3 This artifact demonstrates my ability to perform ethical hacking techniques and analyze system vulnerabilities using penetration testing tools. In this assignment, I conducted reconnaissance and exploitation activities on several virtual machines in a controlled lab environment using tools such as\u00a0Nmap and Metasploit. The goal of the exercise was to identify vulnerabilities and understand&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/academics\/related-courses\/\">Read More<\/a><\/div>\n","protected":false},"author":26712,"featured_media":0,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/pages\/69"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/users\/26712"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/comments?post=69"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/pages\/69\/revisions"}],"predecessor-version":[{"id":265,"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/pages\/69\/revisions\/265"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/pages\/33"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/media?parent=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}