top of page

Setting up Metasploitable lab

Updated: Sep 29, 2023


Image showing Metasploitable logo.

In this blog:

This blog is one of a 4 part series on Metasploitable ➡️


What is Metasploitable?


Metasploitable is an intentionally vulnerable Linux based virtual machine that is used to train pentesters and security professionals.

As mentioned, the machine is vulnerable to attacks that are not possible to execute on modern systems and is solely for educational purposes.

Metasploitable should not be able to face the public network due to its vulnerability.

Downloading Metasploitable on a Virtual Machine


Download Metasploitable2 here ➡️


Click download and the zip file will be downloaded.

Metasploitable downloader.
Metasploitable downloader.

To access the files, right click and extract all from the zip file. I have already extracted it so you can see it underneath.

Metasploitable zip files downloaded.
Metasploitable zip files downloaded.

I have already installed Kali Linux in VirtualBox as you can see on the left. To add a new virtual machine for Metasploitable, click New.

VirtualBox interface.
VirtualBox interface.

Name the new machine and select where you want to download it. Select the type as Linux and version as Ubuntu (64-bit) as this is the version of my kali Linux machine.

Choosing Virtual machine operating system.
Choosing Virtual machine operating system.

Select your base memory and processors. I have set my base memory to the recommended 1024MB and the processors to 1.

Choosing hardware limits.
Choosing hardware limits.

Now use an existing virtual hard disk file and choose the Metasploitable virtual machine disk format file we extracted from the zip file.

Choosing hard disk size.
Choosing hard disk size.

Now click finish.

Summary of Metasploitable Virtual machine.
Summary of Metasploitable Virtual machine.

Inside Metasploitable


Click b to start booting the vm.

Image showing command line interface.
Home page of Metasploitable.

We are in as ➡️

msfadmin
Image showing command line interface.
We are in as msfadmin.

What's next?



Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
  • GitHub
  • Twitter
  • LinkedIn
bottom of page