Metasploitable 2 - Metasploit Documentation
Metasploitable 2 - Metasploit Documentation
Metasploitable 2
A test environment provides a secure place to perform penetration testing and security research.
For your test environment, you need a Metasploit instance that can access a vulnerable target. The
following sections describe the requirements and instructions for setting up a vulnerable target.
The easiest way to get a target machine is to use Metasploitable 2, which is an intentionally
vulnerable Ubuntu Linux virtual machine that is designed for testing common vulnerabilities. This
virtual machine (VM) is compatible with VMWare, VirtualBox, and other common virtualization
platforms.
https://information.rapid7.com/metasploitable-download.html
https://sourceforge.net/projects/metasploitable/
The compressed file is about 800 MB and can take a while to download over a slow connection.
After you have downloaded the Metasploitable 2 file, you will need to unzip the file to see its
contents.
Powering on Metasploitable 2
Once the VM is available on your desktop, open the device, and run it with VMWare Player.
Alternatively, you can also use VMWare Workstation or VMWare Server.
Logging in to Metasploitable 2
The login for Metasploitable 2 is msfadmin:msfadmin .
1 msfadmin@metasploitable:~$ ifconfig
https://docs.rapid7.com/metasploit/metasploitable-2/ 1/2
9/28/21, 2:31 PM Metasploitable 2 | Metasploit Documentation
The command will return the configuration for eth0. You'll need to take note of the inet address.
This will be the address you'll use for testing purposes.
https://docs.rapid7.com/metasploit/metasploitable-2/ 2/2