Discovered 69 vulnerabilities (6 Critical, CVSS 10.0) on Metasploitable2 using Nessus Essentials | Full CVE analysis and remediation report
-
Updated
Feb 25, 2026
Discovered 69 vulnerabilities (6 Critical, CVSS 10.0) on Metasploitable2 using Nessus Essentials | Full CVE analysis and remediation report
Cracked 6 out of 7 user password hashes from an intentionally vulnerable open-source Linux system (Metasploitable 2) using real-world password cracking techniques with tools like John the Ripper and Hashcat. This project was executed during my cybersecurity internship to simulate real-world password auditing on a compromised system.
Ethical hacking is the authorized practice of using hacking techniques to identify and fix security vulnerabilities in computer systems and networks. Unlike malicious hackers, ethical hackers work with permission to improve security and protect sensitive data from potential threats
Virtual machines full of intentional security vulnerabilities. Exploit at will! Metasploitable is essentially a penetration testing lab in a box created by the Rapid7 Metasploit team.
Step-by-step guide to scanning and exploiting Metasploitable2 ports with practical examples. – clear, professional, and searchable.
End-to-end Metasploitable2 vulnerability management & hardening — scans, remediation, verification
A comprehensive penetration testing report detailing 46 security vulnerabilities discovered during a full-scope assessment of a Metasploitable2 lab environment. Findings include Network Services, Web Applications, Privilege Escalation, and Enumeration vulnerabilities.
🛡️ Mise en place d'un laboratoire de Pentest (Sandbox VMware). Documentation complète du cycle d'attaque : de la Reconnaissance à l'Exploitation (Root) sur Metasploitable 2 via Kali Linux.
Add a description, image, and links to the metasploitable2 topic page so that developers can more easily learn about it.
To associate your repository with the metasploitable2 topic, visit your repo's landing page and select "manage topics."