![Kali Linux Network Scanning Cookbook(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/179/36701179/b_36701179.jpg)
上QQ阅读APP看书,第一时间看更新
How it works...
Metasploitable was built with the idea of security testing education in mind. This is a highly effective tool, but it must be handled with care. The Metasploitable system should never be exposed to any untrusted networks. It should never be assigned a publicly routable IP address, and port forwarding should not be used to make services accessible over the Network Address Translation (NAT) interface.