Identifying and exploiting vulnerable services
In this section, you will learn how to use various techniques and tools within Kali Linux. These will help you efficiently identify and exploit security vulnerabilities found on both Windows and Linux-based operating systems that have vulnerable applications and network services running on them.
Exploiting a vulnerable service on a Linux system
In this exercise, you will learn how to discover and exploit a low-hanging fruit within a Linux-based system on a network. The low-hanging fruits are the easier applications/systems to compromise. In this section, you will learn how to exploit a File Transfer Protocol (FTP) service running on a target Linux device.
To get started with this exercise, please use the following instructions:
- Power on both the Kali Linux and Metasploitable 2 virtual machines. Metasploitable 2 is a Linux-based system, which makes it perfect for this hands-on lab.
- Use the following Nmap command to...