Demonstrate the ability to identify vulnerabilities in a Windows 10 system using Nessus and exploit vulnerabilities on a Metasploitable 2 machine using Kali Linux.
This cybersecurity project aimed to replicate real-world penetration testing scenarios by configuring and utilizing three virtual machines (VMs). The primary objective was to showcase proficiency in identifying and exploiting vulnerabilities within a controlled environment.
- Metasploit Framework
- Oracle Virtual Box
- Nmap
- Windows 10 VM (21H2)
- Kali Linux VM
- Metasploitable 2 VM
- Metasploitable 2 VM: 2GB RAM, 2 CPUs, 20GB storage
- Windows 10 VM: 4GB RAM, 2 CPUs, 40GB storage
- Kali Linux VM: 4GB RAM, 2 CPUs, 40GB storage
- Setup Guide: Instructions for setting up the VMs.
- Usage Guide: Instructions for Nessus, Nmap, and Metasploit.