Exploiting-Metasploitable3

Introduction

Metasploitable 3 is a vulnerable virtual machine used for testing and learning purposes in penetration testing. This README outlines the steps taken to identify and exploit vulnerabilities using a Kali Linux VM and Metasploitable 3.

Workflow Overview

1. Environment Setup

2. Target Identification

3. Vulnerability Scanning

4. Directory and File Enumeration

5. Exploit Identification and Execution

6. Post-Exploitation Data Extraction

7. Password Cracking using Hydra