Introduction
In the previous chapter, we enumerated the open ports and searched for possible vulnerabilities. In this chapter, we are going to perform penetration testing of the system over the network. For the purpose of demonstration, we have taken a OS called Stapler, made by g0tmi1k. Stapler can be at https://www.vulnhub.com/entry/stapler-1,150/ .
Along with Stapler, we will also check out exploitation with Metasploitable 2, as briefly covered in the previous chapter. The aim of this chapter is to enlighten the reader about a couple of network-level attack vectors, and to demonstrate different types of attacks. Let's get started with Stapler, a vulnerable OS virtual machine, by loading the image on a virtual machine.