CS 231: Computer Security

Pen testing #2: Metasploit, exploits, and payloads

Nothing to hand in.

This lab is a quick tour through a simple example of how to use exploits and payloads in Metasploit.

What next?