How to set up Metasploitable Lab for WAPT
Hey there! been a minute. In this write-up, I’ll be showing you how to set up your own metalsploitable virtual lab for web application security and penetration testing.
STEP 1
First of, head to over to google and check for metasploitable 2 or visit the link I provided below:
Metasploitable
Download Metasploitable for free. Metasploitable is an intentionally vulnerable Linux virtual machine. This is…sourceforge.net
Wait for about 5 seconds for the download link to load then hit download, if the zip file doesn’t start automatically.
STEP 2
Uncompress/Extract the zip file in your file manager
STEP 3
Head over to your Virtual machine, open the VM file for Metasploitable 2 from there. Follow the picture guide below
Locate where you extracted your file
click on the vm image file
Best bet is to leave the default settings the way they are, because Metaspolitable doesn’t require much disk space
STEP 4
Power on Metasploitable and wait few seconds for it to boot, once it’s done booting, it will request admin username and password. The default username and password is msfadmin . Once entered you should be in.
use ifconfig to check your ip on metasploitable
go to your hacking machine, paste the metasploitable ip in the search bar and you should see the list of servers been hosted on metasploitable you can get your hands dirty with.
Thanks for reading, happy hacking :†