50% found this document useful (2 votes)
576 views

Metasploitable 2 - Metasploit Documentation

Metasploitable 2 is an intentionally vulnerable Ubuntu virtual machine that is used for testing vulnerabilities. It can be downloaded from Rapid7 or SourceForge as a 800 MB file and run using virtualization software. The username and password for logging in is msfadmin/msfadmin. Once logged in, the ifconfig command can be used to identify the IP address assigned to the virtual machine.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
576 views

Metasploitable 2 - Metasploit Documentation

Metasploitable 2 is an intentionally vulnerable Ubuntu virtual machine that is used for testing vulnerabilities. It can be downloaded from Rapid7 or SourceForge as a 800 MB file and run using virtualization software. The username and password for logging in is msfadmin/msfadmin. Once logged in, the ifconfig command can be used to identify the IP address assigned to the virtual machine.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

9/28/21, 2:31 PM Metasploitable 2 | Metasploit Documentation

Metasploitable 2
A test environment provides a secure place to perform penetration testing and security research.
For your test environment, you need a Metasploit instance that can access a vulnerable target. The
following sections describe the requirements and instructions for setting up a vulnerable target.

Downloading and Setting Up Metasploitable 2

The easiest way to get a target machine is to use Metasploitable 2, which is an intentionally
vulnerable Ubuntu Linux virtual machine that is designed for testing common vulnerabilities. This
virtual machine (VM) is compatible with VMWare, VirtualBox, and other common virtualization
platforms.

Metasploitable 2 is available at:

https://information.rapid7.com/metasploitable-download.html

https://sourceforge.net/projects/metasploitable/

The compressed file is about 800 MB and can take a while to download over a slow connection.
After you have downloaded the Metasploitable 2 file, you will need to unzip the file to see its
contents.

Powering on Metasploitable 2
Once the VM is available on your desktop, open the device, and run it with VMWare Player.
Alternatively, you can also use VMWare Workstation or VMWare Server.

Logging in to Metasploitable 2
The login for Metasploitable 2 is  msfadmin:msfadmin .

Identifying Metasploitable 2's IP Address


After you log in to Metasploitable 2, you can identify the IP address that has been assigned to the
virtual machine. Just enter  ifconfig  at the prompt to see the details for the virtual machine.

1 msfadmin@metasploitable:~$ ifconfig

https://docs.rapid7.com/metasploit/metasploitable-2/ 1/2
9/28/21, 2:31 PM Metasploitable 2 | Metasploit Documentation

The command will return the configuration for eth0. You'll need to take note of the inet address.
This will be the address you'll use for testing purposes.

https://docs.rapid7.com/metasploit/metasploitable-2/ 2/2

You might also like