Post

How to set up Metasploitable Lab for WAPT

Hey there! been a minute. In this write-up, I’ll be showing you how to set up your own metalsploitable virtual lab for web application security and penetration testing.

STEP 1

First of, head to over to google and check for metasploitable 2 or visit the link I provided below:

Metasploitable
Download Metasploitable for free. Metasploitable is an intentionally vulnerable Linux virtual machine. This is…sourceforge.net

Wait for about 5 seconds for the download link to load then hit download, if the zip file doesn’t start automatically.

STEP 2

Uncompress/Extract the zip file in your file manager

STEP 3

Head over to your Virtual machine, open the VM file for Metasploitable 2 from there. Follow the picture guide below

Locate where you extracted your file

click on the vm image file

Best bet is to leave the default settings the way they are, because Metaspolitable doesn’t require much disk space

STEP 4

Power on Metasploitable and wait few seconds for it to boot, once it’s done booting, it will request admin username and password. The default username and password is msfadmin . Once entered you should be in.

use ifconfig to check your ip on metasploitable

go to your hacking machine, paste the metasploitable ip in the search bar and you should see the list of servers been hosted on metasploitable you can get your hands dirty with.

Thanks for reading, happy hacking :†

This post is licensed under CC BY 4.0 by the author.