Identify a target you own or having written permission to target. I strongly recommend “Metasploitable” as it will be the simplest path.
Identify a vulnerability in your target using nmap, nessus, or any other tool you want to use.
Use Metaspolit to create an exploit and comprise your target.
Create a 3 page slide deck and a 1 – 2 page executive summary describing what you found and what mitigation you would recommend. Write the assignment as if you where communicating to someone who hired you to test one of their machines.
Leave a Reply
You must be logged in to post a comment.