Analysis Report: Learnings from Metasploit run against a publically available VM the student chooses
Readings:
http://cdn.ttgtmedia.com/rms/pdf/SearchSecurity.in_Burp_%20Suite_tutorial_ Part_01.pdf
http://cdn.ttgtmedia.com/rms/pdf/SearchSecurity.in_Burp_%20Suite_tutorial_ Part_02.pdf
http://cdn.ttgtmedia.com/rms/pdf/SearchSecurity.in_Burp_%20Suite_tutorial_ Part_03.pdf
We will only use the functionality discussed in the first paper.