I decided to leverage my particular professional skill set with this attack. I was a little surprised at how easy Metasploit made it to gain a root shell on the Metasploitable VM. I was able to perform some of the additional steps that a real attacker might. Of course, I stopped short of attacking other systems. (It would not have been possible anyway. My test environment was on a private network with no internet access.)
Leave a Reply
You must be logged in to post a comment.