30 Bird - Exploiting a Linux System (Pentest)

Overview

For this exercise, you'll need to use the Kali and Metasploitable VMs. In this exercise, you'll gain access to the Metasploitable VM using a web shell and then elevate privileges to gain root access.