Walkthrough of Metasploitable assessment with Metasploit

In this section, we are going to learn how to perform an assessment on a vulnerable server called Metasploitable 2. This section will give you a walk through of some of the assessment tests that are carried out in the vulnerability assessment environment. Vulnerability assessment is a very extensive phase. We need to perform many tasks, such as finding out which ports are open on the server, what services are running on them, and whether the services are vulnerable. The same can be done by searching online for a known service vulnerability. All the information gathering and exploit compatibility checking can be done at the vulnerability assessment end. The point where we start exploiting ...

Get Kali Linux Intrusion and Exploitation Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.