Web penetration testingproceed with the follow instructions and answer parts
docker run --name dodgy -it tleemcjr/metasploitable2:latest sh -c "/bin/services.sh && bash"
Find the ipaddress of the dodgy metasploitable2 container.
• docker exec -it dodgy /bin/bash
A) Use searchsploit to prove that vsftpd is vulnerable for this machine. Provide a screen shot of the results of searchsploit command.