Metasploitable2

🕹️ Metasploitable2

👉This report will be assessed according to its accuracy and comprehensiveness regarding every aspect of the test. Its goal is to confirm that the applicant possesses the technical know-how and understanding of penetration testing methodologies necessary to meet the requirements.

# 📌Introduction: This report will be assessed for its accuracy and completeness across all aspects of the test. Its The objective is to verify that the applicant has the technical expertise and comprehensive An understanding of penetration testing methodologies is required to meet the specified criteria.

🎯Objective:

This assessment aims to perform an internal network penetration test on the specified Personal network. The task requires a comprehensive and systematic approach to achieve the desired outcomes. This test aims to simulate a real-world penetration test within the provided testing environment. Additionally, it demonstrates the candidate’s approach from start to finish, including the identification and exploitation of vulnerabilities, as well as the creation of a detailed report.

# 💊Requirements The tester is required to complete a comprehensive penetration testing report, which should include the following sections: • Executive Summary and Recommendations: A non-technical overview summarizing key findings and suggested actions. • Methodology and Vulnerability Analysis: A detailed explanation of the testing approach and identified vulnerabilities. • Findings with Evidence: Each finding should include screenshots, step-by-step walkthroughs, and sample code. • Additional Observations: Any other relevant information not covered in the previous sections.

📌Project Scope

This section defines the scope and boundaries of the project. Project Name: Metasploitable2

🛠️Summary

Outlined is a Black Box Application Security assessment for the Metasploitable2. Finding ID Severity Service Enumeration via Open Ports: Medium Credential Exposure Through Telnet Banner Disclosure: HIGH Exploiting FTP (Anonymous Access): HIGH Samba smbd 3.x Remote Code Execution: HIGH Unveiling Usernames: SMTP Enumeration with Metasploit’s smtp_enum Module: HIGH

🎯 { Service Enumeration }

# 🎉Step to Reproduce 👉 Let’s begin first running the command in the terminal: nmap -sV 192.168.219.132

service enumeration

🎯 { Exposure of Sensitive Information to an Unauthorized Actor}

🎉Step to Reproduce

👉Let’s begin. First, run the command in the terminal: telnet ![credential Exposure](https://github.com/user-attachments/assets/067b526a-3ec4-4a5d-9c98-2f472e94cf90)

credential exposure1

🎯 { Improper Restriction of Excessive Authentication Attempts}

🎉Step to reproduce

anonymous

anonymous 1

🎯 { Samba smbd 3.x Remote Code Execution }

🎉Step to Reproduce

remote code

remotecode1 remotecode2

🎯{ Exploiting SMTP enumeration }

# 🎉Step to reproduce

smtp smtp1 smtp3

🧁 CONCLUSION