July 2018
Beginner
564 pages
12h 22m
English
This chapter will talk about different vulnerabilities and will explain how to perform them on the Metasploitable machine. A detailed illustration of the each of the scenarios will be covered. At the end of every section, we will also see a quick solution to each vulnerability explained.
The chapter will cover the following topics: