A Guide to Hacking Without Metasploit
Ah the old “try harder” wisdom nugget. If taken in the right context, it is a slogan to live by. Unfortunately, most people don’t take it in the right context. Nine times out of ten, this statement is thrown around by egotistical fart clouds on IRC. In that context, it’s degrading and unhelpful.
How do we hack without using Metasploit? I could say “try harder!” and end the article with a smarmy trollface gif, but instead, I’m going to share some (hopefully) useful, actionable tips. If you’re taking the OSCP certification at the moment, or you’re thinking about it, this article is for you.
The use of Metasploit and other similar tools is heavily restricted in the (in)famous OSCP exam. There’s a good reason behind this, it forces students to understand how the exploit actually works. It sucks at the time, but you end up with more knowledge, which is why you’re doing OSCP in the first place, right?
To rid ourselves of Metasploit dependency, we need alternatives and a deeper understanding of some key concepts. By the end of this article, my padawan — know the way, you will.