Tutorial To Setup A Metasploitable and Kali Linux
Tutorial To Setup A Metasploitable and Kali Linux
3/17/2015
Table of Contents
1.
2.
3.
4.
Find the IPv4 address for your Metasploitable 2.0 Virtual Machine (VM)
5.
Find the IPv4 address for your Kali Virtual Machine (VM)
6.
7.
8.
By Carlos Villegas
3/17/2015
b. Update VirtualBox on a regular basis (at least every week). I cant stress how
important updating it is. Sometimes malware (viruses, worms escape
virtualization sandboxes, in this case VirtualBox, via a vulnerability which
eventually gets patched-up. You only get those patches if you update
VirtualBox as shown below:
By Carlos Villegas
3/17/2015
By Carlos Villegas
3/17/2015
By Carlos Villegas
3/17/2015
4. Find the IPv4 address for your Metasploitable 2.0 Virtual Machine (VM)
a. Login to your Metasploitable 2.0 VM
i. Username: msfadmin
ii. Password: msfadmin
b. You will see the following screen once you have successfully logged in. If you
dont, please try to login again.
c. Run the following piped one-line command in the Metasploitable 2.0 terminal
to extract the IPv4 address of your Metasploitable 2.0 VM:
ifconfig | sed -n 2p | cut -d ":" -f2 | cut -d " " -f1
d. The IPv4 address for your Metasploitable 2.0 VM. For this example, it is
identified below with a red arrow; yours may be different and thats OK.
192.168.____.____
5
By Carlos Villegas
3/17/2015
5. Find the IPv4 address for your Kali Virtual Machine (VM)
a. Login to your Kali VM
i. Username: root
ii. Password is whatever you chose when you installed your Kali VM
b. Once you are successfully logged-in to Kali, start a terminal command line by
clicking the icon pointed by the red arrow below
c. Run the following piped one-line command in the Kali terminal to extract the
IPv4 address of your Kali VM:
ifconfig | sed -n 2p | cut -d ":" -f2 | cut -d " " -f1
d. The IPv4 address for your Kali VM. For this example, it is identified below
with a red arrow; yours may be different and thats OK.
192.168.____.____
6
By Carlos Villegas
3/17/2015
By Carlos Villegas
3/17/2015
By Carlos Villegas
3/17/2015
e. Run the following command from your Metasploitable 2.0 VM and verify the
Network is unreachable:
ping c 3 8.8.8.8