Do not clone this repository! Just follow the instructions.
This exercise aims to teach students how to exploit vulnerabilities found in a vulnerable machine (Metasploitable) during the reconnaissance phase. This includes detecting exploitable vulnerabilities and privilege escalation. Note: No post-exploitation activities will be performed.
This is the second of 4 projects that will lead you to a thorough understanding of the world of pentesting. The objective is to carry out all phases of pentesting on a vulnerable computer, specifically using Metasploitable. This second phase focuses on "Exploitation" on a Vulnerable Machine.
Introduction
Methodology
Results
Privilege Escalation
Mitigation
Conclusion
Thanks goes to these wonderful people (emoji key):
Rosinni Rodríguez (rosinni) contribution: (build-tutorial) ✅, (documentation) 📖
Alejandro Sanchez (alesanchezr), contribution: (bug reports) 🐛
This project follows the all-contributors specification. Contributions of any kind are welcome!