Warning: It is illegal to use this tool on any site you do not own or have written permission
Due Date:
November 17, 2017 23:59 hours
Research:
Program requirements:
- Download VM Images Kali Linux (root/toor) and Metasploitable 2
- Run the 2 virtual machines on your own computer simultaneously
- Verify that the Kali VM is able to ping the Metasploitable VM to ensure your network environment is set up correctly
- Try the demonstration steps below to see how a sample exploit works
- Try at least 3 different exploits that succeed with the Metasploitable VM (3 DIFFERENT from the unreal 3.2.1.8 exploit below)
For each exploit, do the following:
- Copy and paste your console log
- In a few sentences describe what exploit does that you found to work, difficulties you may have had, what the exploit achieved, and any other comments.
Submit a report on these 3 exploits you tested in Canvas
Googling for Metasploitable 2 exploits and reproducing them is perfectly acceptable. The requirement is that you must test each exploit yourself and write up a summary in your own words.
Last Revised: January 23, 2017