Answered You can hire a professional tutor to get the answer.

QUESTION

This exercise will require self-study and research, and no help will be provided. Install metasploit - the recommended method is to setup a virtual

This exercise will require self-study and research, and no help will be provided.

  1. Install metasploit - the recommended method is to setup a virtual machine running Kali Linux, which includes metasploit, but other means are fine.
  2. Install a virtual machine running one of the Metasploitable distributions (Metasploitable2 or either of the Metasploitable3 VMs).
  3. Use metasploit (either via the msf command line or a GUI such as armitage) to run an exploit to get a remote shell or command line on the metasploitable VM.
  4. Provide a full-screen screenshot of the end result and a full copy of the msf console log text.
Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question