Now that a vulnerability has been found, the next step is to determine whether there are exploits that can leverage this security weakness.
The following screenshot shows the results of performing a Google search for known exploits for the **VSFTPd 2.3.4** service.
As shown below, there’s a link for an exploit from Rapid7, the creator of Metasploit. Using this **Rapid7** URL, you can gather further details on how to exploit the vulnerability using Metasploit on Kali Linux.
Additionally, notice the second URL within the Google search result, which is from **Exploit-DB**. This is a trusted exploit database that is maintained by the creators of Kali Linux and Offensive Security. These are two trusted online resources for gathering exploits during a penetration test.