A professional vulnerability assessment of the Metasploitable 2 system, demonstrating identification and exploitation of critical vulnerabilities in a controlled lab environment.
- Executive Summary - Key findings and risk assessment
- Methodology - Assessment approach and tools used
- Findings - Detailed vulnerability analysis
- Recommendations - Security improvement suggestions
- Conclusion - Lessons learned
| Vulnerability | CVE | Risk Level |
|---|---|---|
| vsFTPd 2.3.4 Backdoor | CVE-2011-2523 | Critical |
| Samba "username map script" RCE | CVE-2007-2447 | Critical |
| UnrealIRCd 3.2.8.1 Backdoor | CVE-2010-2075 | Critical |
| Java RMI Server Misconfiguration | - | Critical |
report/: Complete vulnerability assessment report (PDF)screenshots/: Evidence of successful exploitation (optional)
This assessment was conducted in a controlled lab environment for educational purposes only. Never test systems without explicit permission.
See references.md for all cited sources and additional reading materials.