当前位置:网站首页>1-4metaploitable2 introduction
1-4metaploitable2 introduction
2022-06-24 07:57:00 【Mountain Rabbit 1】
metasploitable2 Introduce
metasploitable2 The virtual system is a specially made ubuntu operating system , It is designed as a security tool to test and demonstrate common vulnerabilities . edition 2 Already available for download , And it contains more exploitable security vulnerabilities than the previous version . This version of the virtual system is compatible with VMware、virtualbox And other virtual platforms . By default, only one network adapter is enabled and NAT and host-only, This image must not be exposed in a vulnerable network . Because it contains many loopholes , It is easy to be attacked and used by others

metasploitable2 download
download metasploitable2 Image file iso. Download link :https://sourceforge.net/projects/metasploitable/

Click on files, Choose to download the latest version
metasploitable2 install
metasploitable Is an already installed file , Just unzip it
metasploitable2 Use
metasploitable2 Default user name :msfadmin、 password :msfadmin.
Use ifconfig Get the current machine IP Address , Let's use the corresponding security tools , To test
The computer Ping Virtual machine , virtual machine ping No computer , Because , The computer has a firewall , Just turn it off
边栏推荐
猜你喜欢

Moonwell Artemis现已上线Moonbeam Network

From jsonpath and XPath to spl

Error:Kotlin: Module was compiled with an incompatible version of Kotlin. The binary version of its

用Ngrok 配置属于自己的免费外网域名

Practice of opengauss database on CentOS, configuration

Echart 心得 (一): 有关Y轴yAxis属性

Vulnhub靶机:BOREDHACKERBLOG: SOCIAL NETWORK

Exness: Powell insisted on his anti inflation commitment and pointed out that recession is possible

AWTK 最新动态:Grid 控件新用法

Free ICP domain name filing interface
随机推荐
any类备注
[data update] Xunwei comprehensively upgraded NPU development data based on 3568 development board
exness:鲍威尔坚持抗通胀承诺,指出衰退是可能的
常见的数组封装
Chapter 2 line graph of canvas
The describeregion interface of CVM is special and has two versions
Smart pointer remarks
Case examples of corpus data processing (cases related to sentence retrieval)
交友相亲类软件是如何割你韭菜的
2022年PMP项目管理考试敏捷知识点(1)
Take my brother to make a real-time Leaderboard
BOM笔记
位运算
爬虫基础B1——Scrapy(B站学习笔记)
10. Tencent cloud IOT device side learning - firmware upgrade
On the H5 page, the Apple phone blocks the content when using fixed to locate the bottom of the tabbar
1-4metasploitable2介绍
毕业两年月薪36k,说难也不难吧
Using kubeconfig files to organize cluster access
站在风暴中心:如何给飞奔中的腾讯更换引擎