This is what most view as "real" hacking, it involves exploiting security holes in software on machines that are reachable via the, for many tasks here metasploit will be invaluable.
To connect to the machines described in the assignments, you need to connect to our vpn network. More info here.