When talking about exploitation, a couple of services come to mind, mostly related to the fact that they are common on most targets, and most of the time neglected.
Exploiting common services
Getting ready
In this recipe, we will exploit one the most common and abused services that you will find in a target environment, MySQL. Most of the time we can exploit MySQL services because they were installed for development purposes, disregarding some best practices such as setting a root password or using strong passwords.
How to do it
To exploit the MySQL service on the Metasploitable...