![]() In total, we will have 3 machines which will be logically connected in the same network. We will download Virtual box and install it.ĭownload and install Metasploitable which will be our hacking machine.ĭownload and install Windows XP which will be another hacking machine. We will take the following actions to set up our test environment − The recommended OS versions for Metasploit are − Matasploit can be used either with command prompt or with Web UI. The hardware requirements to install Metasploit are − But if you want to install Metasploit as a separate tool, you can easily do so on systems that run on Linux, Windows, or Mac OS X. There are no major differences in the two versions, so in this tutorial, we will be mostly using the Community version (free) of Metasploit.Īs an Ethical Hacker, you will be using “Kali Distribution” which has the Metasploit community version embedded in it along with other ethical hacking tools. Most of its resources can be found at − It comes in two versions: commercial and free edition. Metasploit is one of the most powerful tools used for penetration testing. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |