Goal: After successfully exploiting Metasploitable 2, focus on post-exploitation activities. Steps: Gain a shell using Metasploit. Explore the target system to gather sensitive information (e.g., ...