Deploying Metasploitable 2 as a target system
When building a penetration testing lab, it's important to include vulnerable systems that will act as our targets. These systems contain intentional vulnerable services and applications so that we can practice and build our skills to understand how to discover and exploit vulnerabilities. A very popular vulnerable machine is known as Metasploitable 2. This vulnerable machine contains a lot of vulnerabilities that can be exploited and is good for learning about penetration testing.
Let's get started!
Part 1 – deploying Metasploitable 2
The following steps will help you acquire Metasploitable 2 vulnerable virtual machines so that you can deploy them within the hypervisor:
- Go to https://sourceforge.net/projects/metasploitable/files/Metasploitable2/ and download the
metasploitable-linux-2.0.0.zip
file onto your host system. - Once the ZIP file has been downloaded, extract (unzip) its contents to the location...