Answered You can hire a professional tutor to get the answer.
This exercise will require self-study and research, and no help will be provided. Install metasploit - the recommended method is to setup a virtual
This exercise will require self-study and research, and no help will be provided.
- Install metasploit - the recommended method is to setup a virtual machine running Kali Linux, which includes metasploit, but other means are fine.
- Install a virtual machine running one of the Metasploitable distributions (Metasploitable2 or either of the Metasploitable3 VMs).
- Use metasploit (either via the msf command line or a GUI such as armitage) to run an exploit to get a remote shell or command line on the metasploitable VM.
- Provide a full-screen screenshot of the end result and a full copy of the msf console log text.