July 2018
Beginner
564 pages
12h 22m
English
The second machine that we will use is Metasploitable. Metasploitable is another Linux machine, and you can think of it as the opposite of Kali. Kali is designed so that you can use it to hack into other devices, while Metasploitable is designed so that you hack into it, so it's designed for people who want to learn penetration testing. It is designed so that it has a number of vulnerabilities, and we're going to try to use Kali Linux in order to hack into Metasploitable. Therefore, this is going to be one of the target, or victim, machines.
You can download Metasploitable at https://information.rapid7.com/metasploitable-download.html.
You will end up with a ZIP file, like the following. Once you decompress it, you ...