Post

Metasploitable2: Hands-On Security Lab

Metasploitable2: Hands-On Security Lab

Lab-project on Metasploitable2

Training and keeping the essential skills is very essential in the field of cybersecurity. What better way to do that than by practicing in a controlled, hands-on environment like Metasploitable 2?

Metasploitable2 is vulnerable Linux virtual machine created by Rapid7 for learning and practicing ethical hacking or penetration testing skills. The system includes many intentionally outdated and misconfigured services such as web applications, ssh configurations and insecure databases.

This vulnerable virtual machine provides a safe platform to explore real-world attack techniques, test security tools, and strengthen defensive strategies — all without risking production systems. By working with this kind of environment, cybersecurity professionals and students can continuously develop the analytical, technical, and problem-solving skills needed to stay ahead of evolving threats.

I highly recommend these kind of vulnerable virtual machines for safe learning and practicing the skills needed or learned in cybersecurity.

Required

  • Two virtual machines: One Metasploitable2 and one Kali Linux.
  • Network mode configuration: NEVER allow Metasploitable to access the Internet. You can keep that in the private/isolated network so it can only talk to your attacker VM(Kali in this case).

Tutorials

Nmap

Nmap Service Scan

I started by running Nmap using a service-detection scan to enumerate reachable ports and identify running services. The screenshot above displays several open ports along with the corresponding service names and versions. The service-info section at the bottom summarizes hosts discovered and provides extra metadata useful for follow-up enumeration.

FTP exploitation

FTP Exploit 1

First exploit was the FTP and the vsftpd 2.3.4. I used the Metasploit tool for this.

FTP Exploit 2 FTP Exploit 3

Using the appropriate Metasploit exploit, I gained root access to the vulnerable VM. The interactive shell shown above contains the proof of compromise.

Telnet

Telnet 1 Telnet 2

For the telnet and ssh exploits, i created two files containing usernames and passwords. Using the right Metasploit exploit i was able to perform brute-force attacks both telnet and ssh. After that it was basically using the cracked credentials for the root access.

SSH (Secure Shell)

SSH 1 SSH 2

VNC (Virtual Network Computing)

VNC 1 VNC 2 VNC 3

Simple vnc-exploit using Metasploit!

I will upload other exploits when i have the time! Learning goal for this lab-project was to use Metasploit and perform different attacks and exploits in closed, safe enviroment.

References:

All rights reserved. Any use of my content is strictly prohibited!