Overview
For this exercise, you'll need to use the Kali and Metasploitable VMs. In this exercise, you'll gain access to the Metasploitable VM using a web shell and then elevate privileges to gain root access.
For this exercise, you'll need to use the Kali and Metasploitable VMs. In this exercise, you'll gain access to the Metasploitable VM using a web shell and then elevate privileges to gain root access.