1 00:00:01,900 --> 00:00:02,810 ‫Description. 2 00:00:02,830 --> 00:00:07,330 ‫Metasploitable is a virtual machine image created by SourceForge. 3 00:00:07,390 --> 00:00:10,000 ‫This virtual machine has many vulnerabilities. 4 00:00:10,210 --> 00:00:14,620 ‫Metasploitable is an intentionally vulnerable Linux virtual machine. 5 00:00:15,340 --> 00:00:21,070 ‫This virtual machine can be used for security training, testing security tools, and practicing common 6 00:00:21,070 --> 00:00:23,260 ‫penetration testing techniques. 7 00:00:23,740 --> 00:00:29,110 ‫To install Metasploitable, you first need to download the disk image file to your computer. 8 00:00:29,200 --> 00:00:32,170 ‫For this, open your favorite web browser. 9 00:00:32,170 --> 00:00:33,490 ‫Type Metasploitable. 10 00:00:33,490 --> 00:00:36,960 ‫In the search engine, click on the link belonging to SourceForge. 11 00:00:36,970 --> 00:00:38,080 ‫Among the results. 12 00:00:38,170 --> 00:00:40,930 ‫Click on the download option on this screen. 13 00:00:40,930 --> 00:00:46,600 ‫When the save button is clicked on the screen, the image file starts to be downloaded to the computer. 14 00:00:46,690 --> 00:00:50,980 ‫The download process will take time depending on the internet connection speed. 15 00:00:57,320 --> 00:00:59,240 ‫Add Metasploitable two VM player. 16 00:00:59,270 --> 00:01:01,220 ‫Open the VMware player program. 17 00:01:01,370 --> 00:01:03,230 ‫Click open Virtual machine. 18 00:01:03,320 --> 00:01:07,530 ‫In the window that opens, find the Metasploitable image file you downloaded. 19 00:01:07,550 --> 00:01:09,260 ‫Select the image file. 20 00:01:09,380 --> 00:01:10,580 ‫Select the file. 21 00:01:10,580 --> 00:01:11,810 ‫Click open. 22 00:01:12,050 --> 00:01:17,960 ‫In the window that opens, enter the virtual machine name and specify the folder where you will install 23 00:01:17,960 --> 00:01:19,340 ‫the virtual computer. 24 00:01:19,370 --> 00:01:22,190 ‫Select the folder by clicking the browse button. 25 00:01:22,550 --> 00:01:26,780 ‫I create all virtual computers under a single folder to make it easier. 26 00:01:26,900 --> 00:01:31,700 ‫My recommendation would be to put all virtual computers under a single folder. 27 00:01:32,060 --> 00:01:35,150 ‫I use a folder called VMs on my computer. 28 00:01:35,380 --> 00:01:37,700 ‫I create all my virtual computers here. 29 00:01:37,820 --> 00:01:43,040 ‫Click the down arrow to find the VMs folder where I create a folder called Metasploitable. 30 00:01:43,190 --> 00:01:44,870 ‫Click the import button. 31 00:01:44,990 --> 00:01:47,630 ‫If the warning window appears, click retry. 32 00:01:47,780 --> 00:01:50,180 ‫The import process may take some time. 33 00:01:50,300 --> 00:01:56,000 ‫When the import process is finished, Metasploitable computer will be added on the left side of the 34 00:01:56,000 --> 00:01:56,630 ‫VM player. 35 00:01:56,630 --> 00:01:57,620 ‫Main screen. 36 00:01:59,970 --> 00:02:02,250 ‫Start the computer by clicking the play button. 37 00:02:04,510 --> 00:02:06,130 ‫Enter the username and password. 38 00:02:06,280 --> 00:02:12,490 ‫The default credentials are username vagrant, password vagrant or metasploitable. 39 00:02:12,490 --> 00:02:14,680 ‫Virtual computer is ready to use.