Deploy Metasploitable 2

Guia para descargar, importar y configurar Metasploitable 2 como maquina objetivo de laboratorio.


Step 1: Download Metasploitable 2


Step 2: Import into your virtualization environment

If using VirtualBox

  1. Create a new VM choose Linux Ubuntu (32-bit)
  2. When asked for a hard disk, select Use existing virtual hard disk and point to the downloaded Metasploitable.vmdk
  3. Set:
    • RAM: at least 1 GB
    • CPUs: 1-2
    • Network: Internal Network or Host-only Adapter (never use Bridged mode if connected to a real corporate network)

If using VMware

  1. Open VMware Workstation/Player
  2. Create a new VM select Use existing virtual disk
  3. Choose the .vmdk file
  4. Adjust RAM and network settings as above

Step 3: Network configuration

Your attacker machine (Kali Linux, Parrot OS, or Ubuntu with nmap) and Metasploitable must be on the same internal network.

Example:

  • Attacker VM: 192.168.56.101
  • Metasploitable: 192.168.56.102

Verify connectivity:

ping 192.168.56.102

Step 4: Boot and credentials

Boot Metasploitable 2. Default login:

Username: msfadmin
Password: msfadmin

No additional configuration is needed. Leave the machine running as a target for lab exercises.


Navigation:Report Creation | Home