For this lesson, we’ll be exploiting Metasploitable 2, an intentionally vulnerable Linux distribution created by Rapid7 specifically for training.
Critical reminder: This only works on Metasploitable2 or other systems you own and have explicit permission to attack. Never do this on a real system you don’t own.
You’ll need: Metasploitable 2 VM running, your attacking machine with Metasploit installed, both on the same network.
Start msfconsole and create a workspace for this exercise.
Part of the free Intro to Cyber course by Cover6 Solutions.