
Metasploitable was built with the idea of security testing education in mind. This machine can also be accessed via SSH. The default credential to log in is msfadmin for both the username and password.

To use Metasploitable in VMware, just click on the File drop-down menu and click on Open. Included among these files is the VMware VMX file.

This is because it is already prepared as a VMware virtual machine when it is downloaded from SourceForge. Installing Metasploitable2 is likely to be one of the easiest installations that you will perform in your security lab. One relatively easy method to acquire Metasploitable is to download it from SourceForge at the following URL.

There are many mirrors and torrents available for this. Prior to installing Metasploitable2 in your virtual security lab, you will first need to download it from the Web. It comes fully loaded with a large number of vulnerable network services and also includes several vulnerable web applications. Metasploitable2 is an intentionally vulnerable Linux distribution and is also a highly effective security training tool. We need to first configure a security lab environment using VMware Player (Windows) or VMware Fusion (macOS), and then install Ubuntu server and Windows server on the VMware Player. (For more resources related to this topic, see here.) Introduction In this article, by Michael Hixon, the author of the book, Kali Linux Network Scanning Cookbook – Second Edition, we will be covering:
