write my assignment 1213

This exercise will require self-study and research, and no help will be provided.

  1. Install metasploit – the recommended method is to setup a virtual machine running Kali Linux, which includes metasploit, but other means are fine.
  2. Install a virtual machine running one of the Metasploitable distributions (Metasploitable2 or either of the Metasploitable3 VMs).
  3. Use metasploit (either via the msf command line or a GUI such as armitage) to run an exploit to get a remote shell or command line on the metasploitable VM.
  4. Provide a full-screen screenshot of the end result and a full copy of the msf console log text.
"Not answered?"
Get the Answer