当前位置:网站首页>1-4metasploitable2介绍
1-4metasploitable2介绍
2022-06-24 06:47:00 【山兔1】
metasploitable2介绍
metasploitable2虚拟系统是一个特别制作的ubuntu操作系统,本身设计作为安全工具测试和演示常见漏洞攻击。版本2已经可以下载,并且比上一个版本包含更多可利用的安全漏洞。这个版本的虚拟系统兼容VMware、virtualbox和其它虚拟平台。默认只开启一个网络适配器并且开启NAT和host-only,本镜像一定不要暴露在一个易受攻击的网络中。因为它本身包含很多漏洞,很容易被人进行攻击利用

metasploitable2下载
下载metasploitable2镜像文件iso。下载链接:https://sourceforge.net/projects/metasploitable/

点击files,选择下载最新版本
metasploitable2安装
metasploitable是已经安装好的文件,直接解压就可以了
metasploitable2使用
metasploitable2默认用户名:msfadmin、密码:msfadmin。
使用ifconfig获取当前机器IP地址,让我们可以使用对应的安全工具,进行测试
电脑Ping得通虚拟机,虚拟机ping不通电脑,是因为,电脑开了防火墙,关掉就可以了
边栏推荐
- chrono 使用备注
- What kind of experience is it when the Institute earns 20000 yuan a month!
- Counter attack from outsourcing to big factories! Android has been developed for 5 years, and after a year of dormancy, it has tried to become an offer harvester. Tencent has a fixed salary of 20*15
- Experience of Shenzhou computer
- 后疫情时代下,家庭服务机器人行业才刚启航
- pair类备注
- 智能指针备注
- Unity Culling 相关技术
- Global and Chinese market of anion sanitary napkins 2022-2028: Research Report on technology, participants, trends, market size and share
- [special session] SME growth plan - ECS special session
猜你喜欢
随机推荐
随机数备注
Oracle-高级SQL限定查询
Inline element, block element, inline block element
行内元素、块元素、行内块元素
New features of PHP: bytecode cache and built-in server
Chrono usage notes
BOM notes
【NILM】非入侵式负荷分解模块nilmtk安装教程
Reconfiguration of nebula integration testing framework based on BDD theory (Part 2)
力扣(LeetCode)174. 地下城游戏(2022.06.23)
向量操作与坐标转换相关方法
站在风暴中心:如何给飞奔中的腾讯更换引擎
C# Lambda
Ke Yi fallible point
Counter attack from outsourcing to big factories! Android has been developed for 5 years, and after a year of dormancy, it has tried to become an offer harvester. Tencent has a fixed salary of 20*15
The two most frequently asked locks in the interview
What challenges does the video streaming media platform face in transmitting HD video?
Unity 的序列化
Tuple remarks
语料库数据处理个案实例(读取多个文本文件、读取一个文件夹下面指定的多个文件、解码错误、读取多个子文件夹文本、多个文件批量改名)









