Throughout this chapter and the following ones, we will primarily practice on Metasploitable 2 and Metasploitable 3 (intentionally vulnerable operating systems). Additionally, for the exercises which are not covered in Metasploitable distributions, we will use our customized environment:
- Please follow the instructions to set up Metasploitable 2 at https://community.rapid7.com/thread/2007
- To set up Metasploitable 3, refer to https://github.com/rapid7/metasploitable3
- Refer to the excellent video tutorials to set up Metasploitable 3 at https://www.youtube.com/playlist?list=PLZOToVAK85MpnjpcVtNMwmCxMZRFaY6mT