My cheat works! #Metasploitable 2 is a Linux operating system developed with the highest security vulnerabilities in mind.
You can perform all kinds of tests to perfect security techniques or learn how to get the most out of applications designed for this purpose. Attacks include:
- SQL Injections
- Remote execution
- Zero-day Exploit
- Password Attack
- Cross-site Scripting
- Rootkits
- Man-in-the-Middle (MitM) Attacks
🤓 Follow Me: