For this assignment, you have been assigned as penetration tester to automate the process of scanning and exploitation. You are expected to: For proof of concept and testing your program, you will use metasploitable on a virtual machine. Metasploitable can be found here https://sourceforge.net/projects/metasploitable/. • Write a report that describes which tools you would choose and explain the purpose of each tool; how you would use them in your application; and how you would interpret/present the results in a userfriendly manner • Use sites like exploitdb, rapid7 to find exploits that are not available in Metasploit and utilise them against metasploitable machine • Discuss your automation results and the efficiency of your developed method Pictures are a must to explain the work been conducted. TO PASS Developed application The application should be fully functional and evaluated. You would have critically evaluated tools and their interdependencies Is the application developed working? Does it use other databases to find exploits except of Metasploit internal db? Is the exploitation procedure automated giving you full access to the machine? Analysis and discussion Clearly and concisely explained the issues relating to information exposure, the attacks that this information exposure pose and why the solutions suggested can help mitigate these attacks. Are facts/figures supported by suitable references? Is the report wellpresented and structured? Is it readable? Are pictures available explaining work been conducted