What is Metasploitable 2?
Metasploitable 2 is known as a test environment that provides a secure place to perform penetration testing. For this test environment, you need an instance (Kali, ParrotSec, or any) that can access a vulnerable target.
This blog is for those who want to gain their knowledge on bug bounty.
Note: Hacking without permission is forbidden or illegal, you may jail or get a penalty or both.
What are you going to Learn?
Table of Contents
Analyse the Server and Discover Vulnerablilities
Exploit vsFTP 2.3.4
Generate Target Based WordList (CeWL)
Try Brute-forcing Manually
Try Brute-forcing SSH session using MSF Console
Exploiting SMB Samba port 139 and port 445
Exploit PHP_CGI_Argument Injection
Exploiting java_rmi (Java Remote Method Invocation)
Gaining rootshell from bindshell service
Exploiting a Misconfigured NFS Share
Capture VNC session
Exploit Apache Tomcat/Coyote JSP engine 1.1
Exploit vsFTP 2.3.4
Generate Target Based WordList (CeWL)
Try Brute-forcing Manually
Try Brute-forcing SSH session using MSF Console
Exploiting SMB Samba port 139 and port 445
Exploit PHP_CGI_Argument Injection
Exploiting java_rmi (Java Remote Method Invocation)
Gaining rootshell from bindshell service
Exploiting a Misconfigured NFS Share
Capture VNC session
Exploit Apache Tomcat/Coyote JSP engine 1.1
Post a Comment
If you have any doubts or any queries you can specify here.