This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
VirtualBox: this program will help you create and manage virtual machines. | |
Begin with three VMs: | |
* Metasploitable 2: This virtual machine will be your "target" box, running a vulnerable web application called Mutillidae II that can be exploited in various ways. | |
* Kali Linux: You will use this virtual machine to connect to and exploit the web app being served from the Metasploitable box. Kali comes preloaded with lots of useful penetration testing tools. | |
* Ubuntu 18.04 LTS (Bionic Beaver): This VM will also be a target box. | |
Task 1: Setup the environment: | |
* Download and install Virtualbox |