we will use a deliberately vulnerable Linux image called “Metasploitable 2”. The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities. You can use VMWare to run the image.
Each group must select one vulnerability and exploit it. To exploit, you are expected to perform the necessary hacking activities (scanning, identifying vulnerabilities … etc.).
In order to perform the exploit, you will need an “attack” image. You can use “Kali Linux” as your attack machine. Kali Linux comes with all the tools that you would need to exploit the many vulnerabilities that exist in Metasploitable 2. Other resources can be used too. Examples include BeEF (Browser Exploitation Framework) for launching attacks against web browsers.
12 freelancers are bidding on average $84 for this job
Hello there, I have been in the InfoSec for years. I had conducted tons of security related projects using Metasploitable and Kali. I'm downloading the attached file to check. Regards.
Dear Sir, i am CCIE Security and CHFI with 17 years of cyber security experience. i will do your project and attack vm image as per your requirements. we can discuss further over chat. thanks for reading
just reviewed your requirement, I am Ethical Hacker & Kali Linux My Play Ground. I can do this job without any issue. If You interested for Discussion Then inbox me. Best Regards