This chapter will talk about different vulnerabilities and will explain how to perform them on the Metasploitable machine. A detailed illustration of the each of the scenarios will be covered. At the end of every section, we will also see a quick solution to each vulnerability explained.
The chapter will cover the following topics:
- File upload vulnerabilities
- Code execution vulnerabilities
- Local file inclusion vulnerabilities
- Basic mitigation