Warning: It is illegal to use this tool on any site you do not own or have written permission
 
Due Date:
        November 17, 2017  23:59 hours
 
Research:
https://www.kali.org/downloads
http://r-7.co/Metasploitable2
Program requirements:
  1. Download VM Images Kali Linux (root/toor) and Metasploitable 2
  2. Run the 2 virtual machines on your own computer simultaneously
  3. Verify that the Kali VM is able to ping the Metasploitable VM to ensure your network environment is set up correctly
  4. Try the demonstration steps below to see how a sample exploit works
  5. Try at least 3 different exploits that succeed with the Metasploitable VM (3 DIFFERENT from the unreal 3.2.1.8 exploit below)
  6. For each exploit, do the following:
    Submit a report on these 3 exploits you tested in Canvas
    Googling for Metasploitable 2 exploits and reproducing them is perfectly acceptable.  The requirement is that you must test each exploit yourself and write up a summary in your own words.
                                                                                            Last Revised: January 23, 2017