Thanks, I forgot about DVL. I'll check it out!
My focus isn't really on hacking though, it's more on analyzing attacks. I think people would learn more about pentesting by attacking boxes someone else secured, and forensic analysts would learn more about attacks that someone else did, etc.
So if someone created an Linux Virutalbox image and secured it, gave it to a pentester to hack it, who then gave it to a forensic analysts to analyze it the whole forum could benefit rather than someone like me who's into forensics trying to play a hacker and investigate what happened when they already know all the answers.
If no one wants to secure an image and leave a vulnerability or two, would someone be interested in hacking DVL/Metasploitable and posting the Virtualbox image and tcpdump log for the forensic forum to analyze and share the evidence of the attack?