Reverse connection Metasploitable 2 -> Kali Linux (Samba 3.x) without Metasploit

I am trying to exploit Metasploitable 2 without the use of Metasploit, with the aim of learning. In this case, I am focusing on Samba 3.x (Port TCP 139, 445)
In this link http://www.rwbnetsec.com/samba-3-x/ two different methods are explai… Continue reading Reverse connection Metasploitable 2 -> Kali Linux (Samba 3.x) without Metasploit

Setting up my own vulnerable environment in Debian Linux, similar to metasploitable [on hold]

so I’m a complete newbie to Linux and hacking and I needed help creating my own environment. I’ve done metasploitable, and now want to set up my own vulnerable environment. I’m currently installing and old version of elastics… Continue reading Setting up my own vulnerable environment in Debian Linux, similar to metasploitable [on hold]