Active reconnaissance and exploitation of a vulnerable web server using Kali and Metasploitable2.
This lab walks through discovery and exploitation against a target web server. Recon uses Nmap, whatweb, curl, netcat, and Metasploit. Exploitation leverages msfvenom and a reverse handler to obtain a shell, followed by post-exploitation recon.
Environment: Kali Linux attacking a Metasploitable2 VM on a virtual network.
msfvenom
and Upload