官术网_书友最值得收藏!

Metasploitable

Metasploitable is an intentionally vulnerable machine that you can use to test Metasploit exploits to obtain shell permissions. Metasploitable differs from other vulnerable machines, since it focuses more on the operating system and network layer.

Metasploitable currently has three versions to date; these are aptly named Metasploitable, Metasploitable 2, and Metasploitable 3.

There are significant changes in each release over and above how you would set them up.

Metasploitable (version 1) is a VM-based customized Ubuntu image. Within this image, there is a number of vulnerable and poorly configured software installed. For example, you might have Tomcat with weak credentials, easily exploitable using Metasploit.

Metasploitable (version 1) is available on Vulnhub for download at  https://www.vulnhub.com/entry/metasploitable-1,28/.

Metasploitable 2, which was more robust, had a lot more vulnerabilities introduced. It included more than 30 exposed ports that would show up in a Nmap scan. It also included vulnerable web applications, such as Damn Vulnerable Web App (DMVA) and Mutillidae. This allowed people to test their web application penetration testing skills.

Metasploitable (version 2) is available for download at  https://information.rapid7.com/download-metasploitable-2017.html.

Metasploitable 3 upped the game. Versions 1 and 2 were Linux-based, but version 3 is Windows-based. Metasploitable 3 makes use of automation and provisioning. The build process is simple and robust, all of its scripts are open source, and it leverages tools such as vagrant and packer. At the time this book was written, Metasploitable 3 supports both VMware and Virtualbox. 

Metasploitable 3 is available for download from  https://github.com/rapid7/metasploitable3.

There is additional software that needs to be installed prior to getting Metasploitable up and running. The following are required:

The build steps for Metasploitable 3 are relatively simple and can be found on the GitHub repository maintained by Rapid7 (https://github.com/rapid7/metasploitable3). There are resources available on the internet that host pre-built Metasploitable 3 VMs.

In Chapter 5, Diving into the Metasploit Framework, we will perform various tasks using the Metasploitable labs discussed here.
主站蜘蛛池模板: 电白县| 宝山区| 江安县| 鄂尔多斯市| 德江县| 永清县| 古交市| 林甸县| 龙门县| 濮阳县| 荔波县| 大足县| 安岳县| 乐昌市| 宜州市| 玉溪市| 连江县| 宁武县| 定日县| 会同县| 汝城县| 新干县| 石景山区| 华亭县| 瑞金市| 泊头市| 遂溪县| 报价| 尉氏县| 宜春市| 临高县| 高陵县| 应用必备| 天长市| 达孜县| 建阳市| 高雄市| 陵川县| 东阳市| 息烽县| 大竹县|