Metasploitable 2 Download


Home > How To > Metasploitable 2 Download

Posted by Lofi X Hacking Team


In this article, We will learn about What is metasploitable 2 & How to Download it ?


Info about Metasploitable 2



Metasploitable 2 is a purposely vulnerable Ubuntu Linux virtual machine made for testing common vulnerabilities, It is the simplest approach to obtain a target system. This virtual machine (VM) works with VirtualBox, VMware, and other widely used virtualization platforms.

A test environment offers a safe setting for "security analysis" and "penetration testing". You require a Metasploit instance that can access a weak target for your test environment. The prerequisites and directions for setting up a susceptible target are described in the following sections.


metasploitable-2-download-info

Download and Setup Metasploitable 2


Using Metasploitable 2, a purposely vulnerable Ubuntu Linux virtual machine made for testing common vulnerabilities, is the simplest approach to obtain a target system. This virtual machine (VM) works with VirtualBox, VMware, and other widely used virtualization platforms.



Metasploitable 2 is available at:


Downloading link 1

Downloading link 2



The compressed file is roughly 800 MB in size, so downloading it over a sluggish connection may take some time. You must unzip the Metasploitable 2 file after downloading it in order to view its contents.


metasploitable-2-download-info

Powering on Metasploitable 2


Open the device and launch VMWare Player once the VM is available on your desktop. You may also use VMware Workstation or VMware Server as an alternative.


Log in to Metasploitable 2


The login for Metasploitable 2 is msfadmin:msfadmin.


Identify Metasploitable 2's IP Address


You may get the IP address that has been allocated to the virtual machine after logging into Metasploitable 2. If you want to access the details about the virtual machine, simply type ifconfig at the prompt.


msfadmin@metasploitable:~$ ifconfig

The configuration for eth0 will be returned by the command. You must write down the inet address. You'll use this address for testing purposes only.


Help with Metasploitable 2


For more information on Metasploitable 2, checkout our social links.


Thanks for reading the article. We hope that this article will be worthful to you. See you in the next article.


Stay Safe, Stay Secure

DISCLAIMER: This Article is for EDUCATIONAL PURPOSE only. Don't use the given information for illegal activities. Your are the only responsible for your actions!



Back to Top ↑




Follow Us



© Lofi X Hacking, 2022. All Rights Reserved.