Beginner Friendly Hacking Challenge - Metasploitable 2 Walkthrough

In this video we go from enumeration to root shell on the purposely vulnerable Metasploitable 2 CTF machine.

6 Likes