Figure 3
«
Previous
|
Hunt down vulnerabilities with the Metasploit pen-testing tool
|
Next image
»
Figure 3: Metasploitable, an extremely vulnerable version of Linux, offers good attack vectors.
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.