Deploying Metasploitable 2 as a vulnerable machine
When building a penetration testing lab, it’s important to include vulnerable systems that will act as our targets. These systems contain intentionally vulnerable services and applications, enabling us to practice and build our skills to better understand how to discover and exploit vulnerabilities. A very popular vulnerable machine is known as Metasploitable 2. This vulnerable machine contains a lot of security vulnerabilities that can be exploited and is good for learning about ethical hacking and penetration testing.
To get started setting up Metasploitable 2 within our lab environment, please use the following instructions:
Part 1 – deploying Metasploitable 2
The following steps will guide you to acquiring the Metasploitable 2 virtual machine and deploying it within Oracle VM VirtualBox Manager:
- Firstly, on your host computer, go to https://sourceforge.net/projects/metasploitable/files/Metasploitable2...