Loading...
Monday, May 21, 2012

Metasploitable - vulnerable Linux virtual machine

This is Metasploitable2 (Linux)

Metasploitable is an intentionally vulnerable Linux virtual machine.

This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques.
 


One of the problems we encounter when learning how to use an exploitation framework is trying to configure targets to scan and attack. Luckily, the Metasploit team is aware of this and released a vulnerable VMware virtual machine called 'Metasploitable'.
This VM has a number of vulnerable services and packages installed for you to hone your skills on.

The VM will run on any recent VMware product and is configured with a non-persistent disk so any potential damage you do to the system will be reverted on reboot. You can download the torrent file of Metasploitable from http://updates.metasploit.com/data/Metasploitable.zip.torrent.

Once you have downloaded the VM, extract the zip file, open up the vmx file using your VMware product of choice, and power it on. After a brief time, the system will be booted and ready for action.

The default login and password is msfadmin:msfadmin.

Never expose this VM to an untrusted network (use NAT or Host-only mode if you have any questions what that means).

To contact the developers, please send email to msfdev@metasploit.com

Download :
metasploitable-linux-2.0.0-beta2.zip (873.1 MB)
Find Details about Version
To contact the developers, please send email to msfdev@metasploit.com
Read more About This Project : http://metasploit.com/

For More Information on Metasploitable -

1 comments:

 
TOP