From the course: Penetration Testing with Metasploit
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Setting up target machines - Metasploit Tutorial
From the course: Penetration Testing with Metasploit
Setting up target machines
- In order to practice our skills, we will set up some intentionally vulnerable virtual machines so that we can practice alongside them. Our lab setup would be something similar to this. We will have an attacker machine, which is Kali Linux and the IP address for the same, would be 10.0.2.15, we would also have our victim machine or the target machines. For the course, we will be using at least two separate victim machines, one Linux-based and the other Windows-based. For our Linux-based victim operating system, we will be using Metasploitable 2 There's an intentionally vulnerable virtual machine created for our practice. You can download it from the sourceforge website. The link is given on the screen. For the Windows-based operating system, as the victim will be using Windows 10. Depending on our needs, we may use any other victim machines as and when required. You can download the 90-day evaluation version of Windows…