1 00:00:02,100 --> 00:00:07,530 ‫Description Metasploitable is a virtual machine image created by SourceForge. 2 00:00:07,620 --> 00:00:10,200 ‫This virtual machine has many vulnerabilities. 3 00:00:10,380 --> 00:00:14,820 ‫Metasploitable is an intentionally vulnerable Linux virtual machine. 4 00:00:15,510 --> 00:00:21,270 ‫This virtual machine can be used for security training, testing security tools, and practicing common 5 00:00:21,270 --> 00:00:23,460 ‫penetration testing techniques. 6 00:00:23,940 --> 00:00:29,340 ‫To install Metasploitable, you first need to download the disk image file to your computer. 7 00:00:29,400 --> 00:00:32,400 ‫For this, open your favorite web browser. 8 00:00:32,400 --> 00:00:33,690 ‫Type Metasploitable. 9 00:00:33,690 --> 00:00:37,160 ‫In the search engine, click on the link belonging to SourceForge. 10 00:00:37,170 --> 00:00:38,280 ‫Among the results. 11 00:00:38,400 --> 00:00:41,130 ‫Click on the download option on this screen. 12 00:00:41,130 --> 00:00:46,740 ‫When the save button is clicked on the screen, the image file starts to be downloaded to the computer. 13 00:00:51,490 --> 00:00:55,570 ‫The download process will take time depending on the internet connection speed. 14 00:00:55,660 --> 00:00:58,150 ‫Add Metasploitable VirtualBox. 15 00:00:58,300 --> 00:01:00,420 ‫Open the VirtualBox program. 16 00:01:00,430 --> 00:01:03,900 ‫Click the import button on the screen that appears. 17 00:01:03,910 --> 00:01:07,360 ‫Navigate to the folder where the OVA file is located. 18 00:01:07,360 --> 00:01:12,070 ‫You can do this by clicking the folder icon next to the box labeled file. 19 00:01:12,100 --> 00:01:14,380 ‫Select the file, click open. 20 00:01:14,500 --> 00:01:16,840 ‫Click next to proceed to the next step. 21 00:01:16,960 --> 00:01:22,330 ‫This section contains general information about the virtual computer at the bottom of the window. 22 00:01:22,330 --> 00:01:27,940 ‫In the machine based folder section, we determine where the image file will be installed. 23 00:01:28,000 --> 00:01:33,100 ‫My recommendation would be to collect all virtual computers under a single folder. 24 00:01:33,460 --> 00:01:38,800 ‫I use a folder called VMs on my computer and I create all my virtual computers. 25 00:01:38,800 --> 00:01:44,920 ‫Here you can right click on the image file and copy or move it with one of the copy or move options. 26 00:01:45,250 --> 00:01:51,640 ‫I go to the folder, click Open Folder, click finish and wait for the import process to finish. 27 00:01:51,730 --> 00:01:57,220 ‫At the end of the import process, you can see that Metasploitable has been added to the virtual box 28 00:01:57,220 --> 00:01:57,970 ‫menu. 29 00:01:58,120 --> 00:02:03,190 ‫Start the computer by clicking Start Enter Username and password. 30 00:02:03,370 --> 00:02:05,620 ‫The default credentials are. 31 00:02:05,650 --> 00:02:07,330 ‫Username vagrant. 32 00:02:07,330 --> 00:02:08,680 ‫Password vagrant. 33 00:02:08,710 --> 00:02:12,550 ‫You may get an error message like this after adding Metasploitable. 34 00:02:12,640 --> 00:02:16,150 ‫This is due to a problem with the virtual machines Ethernet cards. 35 00:02:16,180 --> 00:02:21,400 ‫To solve this problem, click setting of the Metasploitable virtual Machine. 36 00:02:21,430 --> 00:02:23,410 ‫Click network on the left side. 37 00:02:23,500 --> 00:02:26,110 ‫Click adapter to on the right side screen. 38 00:02:26,230 --> 00:02:29,080 ‫Remove the box next to enable Network Adapter. 39 00:02:29,200 --> 00:02:32,560 ‫Click okay and exit start Metasploitable. 40 00:02:37,320 --> 00:02:39,570 ‫In a virtual computer is ready to be used.