![]() ![]() This document outlines many of the security flaws in the Metasploitable 2 image. (Note: A video tutorial on installing Metasploitable 2 is available here.) By default, Metasploitable's network interfaces are bound to the NAT and Host-only network adapters, and the image should never be exposed to a hostile network. This virtual machine is compatible with VMWare, VirtualBox, and other common virtualization platforms. ![]() Version 2 of this virtual machine is available for download and ships with even more vulnerabilities than the original image. ![]() The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities. ![]()
0 Comments
Leave a Reply. |