![]() Currently missing is documentation on the web server and web application flaws as well as vulnerabilities that allow a local user to escalate to root privileges. This document outlines many of the security flaws in the Metasploitable 2 image. (Note: A video tutorial on installing Metasploitable 2 is available here.) ![]() By default, Metasploitable's network interfaces are bound to the NAT and Host-only network adapters, and the image should never be exposed to a hostile network. This virtual machine is compatible with VMWare, VirtualBox, and other common virtualization platforms. Version 2 of this virtual machine is available for download and ships with even more vulnerabilities than the original image. The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |