Paper Title
PENETRATION TESTING AND METASPLOIT

Abstract
Abstract - In this paper, penetration testing in general will be discussed, as well as how to penetration test using Metasploit on Metasploitable2. Metasploitable2 is a vulnerable system that we chose to use, as using any other system to do this on would be considering hacking and have could have bad consequences. The main purpose of the research is to show the various tools used when trying to find vulnerabilities in a system. By using Metasploit to test a system, we can find the vulnerabilities that need to be fixed in order to better protect the system. Certain areas like network protocols, firewalls, and basic security issues will be explored in this research. While there are a lot of different ways to do penetration testing, we have chosen to use Metasploit because of the broad uses it has and its simplicity. We will have the option of either using the community version of the product, which is mostly automated, or by using the command line within Metasploit. While there are a lot of different ways to do penetration testing, we have chosen to use Metasploit because of the broad uses it has and its simplicity. We will have the option of either using the community version of the product, which is mostly automated, or by using the command line within Metasploit. Both of these options will be explored in this paper. Alongside all of the tools used in Metasploit, we will show how to effectively find the vulnerabilities within a system of your choice. After going through all of the steps in this paper, anyone should be able to try and exploit any system they feel is vulnerable. Keywords - Vulnerabilities, Stuxnet, Penetration Testing, Metasploit, Metasploitable2, Pen-Testing, Exploits, Nmap, and Kali Linux.