The lack of vulnerable targets is one of the hindrances to practice the skill of ethical hacking. Metasploitable is one of the best Vulnerable OS useful to learn ethical hacking. Many of my students have been asking me for metasploitable tutorials. So today I decided to make a complete metasploit hacking guide in accordance with ethical hacking methodology. I am planning this series for absolute beginners as expected. This would start with installation of the OS and creating a pentesting lab. I would regularly add the howto’s in sequence until we completely hack the system. So keep following.
Let’s start with installing the hacker’s operating system.
If that was little difficult, try the easy method.
So our attacker OS is ready, now let’s install the target or victim. Enter Metasploitable.
Now let’s create a pentestlab for our hacking missions.