Final thoughts on the metasploitable 2 virtual machine.
If you found another way to exploit this service, please leave an explaination in the comments. I'd love to hear about it, and I'm sure everyone else would too!
This video is for educational purposes only! I do not recommend or condone the use of this knowledge for illegal purposes.