This repository contains documentation and walkthroughs of vulnerabilities exploited in Metasploitable2, a deliberately vulnerable Linux machine used for ethical hacking practice.
- SSH Brute Force (Hydra)
- VSFTPD 2.3.4 Backdoor
- Samba Usermap Script Exploit
- Tomcat Manager WAR Deployment
- Kali Linux
- Nmap
- Hydra
- Metasploit Framework
- Netcat
- John the Ripper
/ssh-exploit: Brute force SSH login using Hydra/ftp-exploit: Exploiting VSFTPD 2.3.4 backdoor to gain shell/samba-exploit: (Coming soon) Exploiting Samba Usermap script vulnerability/tomcat-exploit: (Coming soon) Gaining remote code execution via Tomcat Manager WAR upload
This project is for educational purposes only. All testing was performed on a controlled local environment (Metasploitable2 in VirtualBox). Never perform these actions on systems you do not own or have explicit permission to test.