Metasploitable2 Exploration

Go up to the NWS HW page (md) | view one-page version

Overview

In this assignment you will explore the metasploit Docker container. This container, based on the Metasploitable 2 setup, and the tleemcjr/metasploitable2 Docker image, is an intentionally vulnerable container where one can practice exploits. We will be working through a few of the intentional exploits in the image.

You will be submitting a metasploit.py (src) Python file.