How To Build Your Own Cyber Security Home Lab Part 3 Exploiting and Penetrating of Metasploitable 2