Exploitation Plan:
1) Look over scans and vulnerabilities for machines previously selected
2) Begin exploitation for your machines
• 192.168.99.39
• 192.168.99.40
• 192.168.99.41
• 192.168.99.42
3) Write up exploitation plan (look at exploit plan example & exploitation plan guidelines)
4) Provide exploitation plan
For exploitation you are free to use any means you feel are necessary to get into the system. The goal here is test the machine for vulnerabilities and any exploits that can be executed on your machines