Course Content
Intro to Cyber
📺 Livestream Timestamp: 3:05:00 — Exploitation Fundamentals

For this lesson, we’ll be exploiting Metasploitable 2, an intentionally vulnerable Linux distribution created by Rapid7 specifically for training.

Critical reminder: This only works on Metasploitable2 or other systems you own and have explicit permission to attack. Never do this on a real system you don’t own.

You’ll need: Metasploitable 2 VM running, your attacking machine with Metasploit installed, both on the same network.

Start msfconsole and create a workspace for this exercise.


Part of the free Intro to Cyber course by Cover6 Solutions.

Scroll to Top