First download the VirtualBox VM image (approx 3.6 Gb) from the Offensive Security site.
For the purposes of this ‘How To’ article we are going to install Kali Linux 64-bit. Now that we have Metasploitable as our target machine, a Penetration Testing client is required. This is good because we do not want such a vulnerable machine open to being hacked from outsiders especially if the local machine is connected to a public WiFi network: Kali Linux installation Once started you should be prompted for login credentials (msfadmin/msfadmin):Īfter logging-in run the ‘ifconfig’ command and note that Metasploitable is not attached to the local network but has been assigned its own IP Address e.g. The VirtualBox Manager should now show the Metasploitable VM so fire it up via the ‘Start’ button: Once the above details have been entered click ‘Create’: Metasploitable test
The compressed ZIP file is likely to be in the Downloads folder so extract the contents into a sub-folder from the current home folder: unzip Downloads/metasploitable-linux-2.0.0.zip Now that we have VirtualBox installed it is time to download the Metasploitable VM (approx 825 Mb) from Rapid7 from here which first requires the completion of a personal details form.
For the above configuration I downloaded the latest ‘.deb’ file and via the File Explorer double-clicked on the file which opened the Ubuntu Software GUI app to do the install. We are going to install the VirtualBox VM on the following Linux desktop:įirst download the correct VirtualBox installation file for your platform from here. Metasploitable is available as a Linux-based Virtual Machine (VM) that can run on VMWare, VirtualBox and other virtualization platforms. Here we are going to cover installing and configuring Metasploitable together with Kali Linux as part of a Penetration Testing lab. In our recent article on Practicing your Hacking skills we covered a number of packages and websites where you can legally hone your Hacking skills.