August 18th 2025
// Overview
This project involves creating a virtual lab with Kali Linux and Metasploitable 2. Tasks include configuring network settings, scanning the subnet to identify connected devices and open ports, performing banner grabs, and outlining key factors attackers use to compromise security. Screenshots document each step.
// Read More
View Full Documentation
// Comments