Technical requirements
To complete this chapter, you will require the following:
- Kali Linux 2022.1 or later
- A wireless network adapter capable of working in monitor mode
- Metasploitable 2
In this chapter, we will introduce a new component to our lab: a purposefully vulnerable virtual machine called Metasploitable 2. Although this virtual machine image has been out for a few years, it is still valuable since it enables you to practice your skills.
Metasploitable 2 can be downloaded from the following URL: https://sourceforge.net/projects/metasploitable/files/Metasploitable2/.
Once downloaded, you will need to extract the archive. You can then open the virtual machine with your hypervisor software.
Caution
This virtual machine is vulnerable to a slew of exploits. Please be careful if you expose it to the internet.
Now that we have our lab ready, let’s dive into the chapter.