Hi,
I can create 2 VM with Metasploitable and a Kali Linux according to your needs. Then I can exploit the vulnerability that you want and create a nice report with this aspects:
◦ Vulnerability
◦ How the exploit works
◦ OS, Software involved
◦ Network topology (if applicable)
◦ Configuration
◦ Proposed Solution
◦ Screen shots from the different actions necessary for the exploit (scanning, execution, success … etc.)
I can answer you any question you might have.
Best regards