Overview
NOTE: The Kali and Metasploitable VMs should be running.
In this exercise, you'll access the Metasploitable VM using a web shell and then elevate privileges to gain root access.
In this exercise, you'll access the Metasploitable VM using a web shell and then elevate privileges to gain root access.