Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.
1. Download and setup Metasploitable 2 as a VM @
http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ (Links to an external site.)
2. Run Metasploitable 2 and make sure it’s connected to your VM network… might take a bit of Linux shell power. I recommend separating your Kali and Metasploitable 2 VM’s so that they can only talk to each other and are not connected to the rest of your home network. You may need to break this initially in order to update and upgrade your Kali instance.
3. Use Kali to host a network vulnerability scanning tool (OpenVAS, Nessus, Nexpose, Retina, etc) to scan the Metasploitable 2 OS for vulnerabilities. DO NOT INCLUDE any of the rest of your home network. Output the results in a format that you can submit here and evaluate for future homework. No editing required this one time. The direct output from the tool will be acceptable. Analyze the results looking for major weaknesses and potential false positives .
4. Write a short (~1 page) Process Report explaining which tool you picked and why, how you set up the tool, any difficulties that you ran into while performing the assignment. At the end of the process report, pick 3 found vulnerabilities and that you feel are most important to mitigate. List them and write a couple sentences telling me why you picked them.