(This is an interim post and will be updated progressively. This notewill be removed once done.)
This post extends the walk-though on the initial version ofMetasploitable athttp://nkush.blogspot.com.au/2011/09/metasploitable-walkthrough.html. Itshould be noted that some commands and output may have been truncatedfor the purposes of brevity.
Set-upThe set-up included two machines in a virtual test environment usingVirtualBox. The first was a Metasploitable virtual machine (VM) and thesecond a Kali 1.
Read More →