Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
QUESTION
Install metasploit - the recommended method is to setup a virtual machine running Kali Linux, which includes metasploit, but other means are fine.
- Install metasploit - the recommended method is to setup a virtual machine running Kali Linux, which includes metasploit, but other means are fine.
- Install a virtual machine running one of the Metasploitable distributions (Metasploitable2 or either of the Metasploitable3 VMs).
- Use metasploit (either via the msf command line or a GUI such as armitage) to run an exploit to get a remote shell or command line on the metasploitable VM.
- Provide a full-screen screenshot of the end result and a full copy of the msf console log text.