Walkthrough of Metasploitable assessment with Metasploit
In this section, we are going to learn how to perform an assessment on a vulnerable server called 2. This section will give you a walk through of some of the assessment tests that are carried out in the vulnerability environment. Vulnerability assessment is a very extensive phase. We need to perform many tasks, such as finding out which ports are open on the server, what services are running on them, and whether the services are vulnerable. The same can be done by searching online for a known service vulnerability. All the information gathering and exploit compatibility checking can be done at the vulnerability assessment end. The point where we start exploiting the system for root or shell attacks can be termed as penetration testing.
Getting ready...
For this exercise, we will require 2, a deliberately created vulnerable virtual machine with many services which contain vulnerabilities. The virtual machine of this can be downloaded...