Setting up Metasploitable lab

 Image showing Metasploitable logo.


In this blog:

  • What is Metsploitable?
  • Downloading Metasploitable on Virtual Machine.
  • Inside Metasploitable.
  • What's next?

This blog is one of a 4 part series in Metasploitable.

Click here to see how to run a DOS attack on Metasploitable.

Click here to see how to deface Metasploitable's webpage.




What is Metasploitable?

Metasploitable is an intentionally vulnerable Linux based virtual machine that is used to train pentesters and security professionals. 

As mentioned, the machine is vulnerable to attacks that are not possible to execute on modern systems and is solely for educational purposes. 

Metasploitable should not be able to face the public network due to its vulnerability. 


Downloading Metasploitable on Virtual Machine

Download Metasploitable2 here ➡️ 

https://sourceforge.net/projects/metasploitable/

Click download and the zip file will be downloaded. 

Image showing Metasploitable download page.
Metasploitable download page.

To access the files, right click and extract all from the zip file. I have already extracted it so you can see it underneath. 

Image showing downloaded zip file.
Downloaded zip file.


I have already installed Kali Linux in VirtualBox as you can see on the left. To add a new virtual machine for Metasploitable, click New. 

Image showing VirtualBox.
VirtualBox.

Name the new machine and select where you want to download it. Select the type as Linux and version as Ubuntu (64-bit) as this is the version of my kali Linux machine. 

Image showing creation of new virtual machine.
Creating a new virtual machine.


Select your base memory and processors. I have set my base memory to the recommended 1024MB and the processors to 1.


Image showing creation of new virtual machine.
Choosing hardware resources for virtual machine.



Now use an existing virtual hard disk file and choose the Metasploitable virtual machine disk format file we extracted from the zip file.


Image showing creation of new virtual machine.
Adding our virtual hard disk.


Now click finish.


Image showing creation of new virtual machine.
Finishing the set-up.


Inside Metasploitable

Click b to start booting the vm.

Image showing Metasploitable bootup screen.
Booting Metasploitable


We are in as msfadmin.

Image showing Metasploitable.
Inside Metasploitable.

What's next?


Comments

Popular posts from this blog

Connecting Metasploitable to Kali Linux

Fixing kernel timer error in Metasploitable

Wireshark alternative ➡️ tcpdump (Linux)