Hacking 2
Date: 2026-02-18
Difficulty: Intermediate
Delivered By: Percy Baker
Overview
Hacking 2 is the second of a 3-part ethical hacking series where we'll teach you how to scan a network for targets and gain access to those targets. The aim is to walk you through roughly what a real-life penetration test might look like.
This week we will be covering how to exploit the machines you found last week using metasploit - gaining unauthorised access to different, vulnerable services and their stored data via a kali VM.
The session will consist of:
-
Rescanning the network to find the new, more vulnerable services on the network.
-
Searching Metasploit for vulnerabilities to the services you find, to gain access to the data stored within.
Prerequisites
To complete this session, you must have a kali Virtual Machine. You can find the details on how to install one in the links below. If you need any additional assistance in getting your VM ready for the session, please ask a member of the committee to help either before or during the session.
Useful Resources
- Our docs page for creating a Kali VM
- Guide for creating Kali VM
- A different guide for creating Kali VM
- Kali website
