Deploy Metasploitable 2
Guia para descargar, importar y configurar Metasploitable 2 como maquina objetivo de laboratorio.
Step 1: Download Metasploitable 2
- Official download: Metasploitable 2 (SourceForge)
- File comes as a VMware image (
.vmdk)
Step 2: Import into your virtualization environment
If using VirtualBox
- Create a new VM → choose Linux → Ubuntu (32-bit)
- When asked for a hard disk, select Use existing virtual hard disk and point to the downloaded
Metasploitable.vmdk - Set:
- RAM: at least 1 GB
- CPUs: 1-2
- Network: Internal Network or Host-only Adapter (never use Bridged mode if connected to a real corporate network)
If using VMware
- Open VMware Workstation/Player
- Create a new VM → select Use existing virtual disk
- Choose the
.vmdkfile - Adjust RAM and network settings as above
Step 3: Network configuration
Your attacker machine (Kali Linux, Parrot OS, or Ubuntu with nmap) and Metasploitable must be on the same internal network.
Example:
- Attacker VM:
192.168.56.101 - Metasploitable:
192.168.56.102
Verify connectivity:
ping 192.168.56.102Step 4: Boot and credentials
Boot Metasploitable 2. Default login:
Username: msfadmin
Password: msfadmin
No additional configuration is needed. Leave the machine running as a target for lab exercises.
Navigation: ← Report Creation | Home