Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used as a target for testing exploits with metasploit.
Metasploitable3 is released under a BSD-style license. See COPYING for more details.
To use the prebuilt images provided at https://app.vagrantup.com/rapid7/ create a new local metasploitable workspace:
Linux users:
mkdir metasploitable3-workspace
cd metasploitable3-workspace
curl -O https://raw.githubusercontent.com/rapid7/metasploitable3/master/Vagrantfile && vagrant up
Windows users:
mkdir metasploitable3-workspace
cd metasploitable3-workspace
Invoke-WebRequest -Uri "https://raw.githubusercontent.com/rapid7/metasploitable3/master/Vagrantfile" -OutFile "Vagrantfile"
vagrant up
Or clone this repository and build your own box.
System Requirements:
- OS capable of running all of the required applications listed below
- VT-x/AMD-V Supported Processor recommended
- 65 GB Available space on drive
- 4.5 GB RAM
Requirements:
- Packer
- Vagrant
- Vagrant Reload Plugin
- VirtualBox, libvirt/qemu-kvm, or vmware (paid license required)
- Internet connection
-
- On Linux/OSX run
./build.sh windows2008
to build the Windows 2008 box, run./build.sh windows2012
to build the Windows 2012 box, run./build.sh windows2016
to build the Windows 2016 box or./build.sh ubuntu1404
to build the Linux box. If /tmp is small, useTMPDIR=/var/tmp ./build.sh ...
to store temporary packer disk images under /var/tmp. Note Automatic build for Windows 2012, 2016, and 2019 are only available on Linux/OSX. In order to build Server 2019 you must find the iso yourself as the iso is not yet available as a download in Microsoft's Evaluation Center. Once you download the iso open the windows_2019.json file and at the bottom update the name of the iso in the url section and update the checksum value. - On Windows, open powershell terminal and run
.\build.ps1 windows2008
to build the Windows box or.\build.ps1 ubuntu1404
to build the Linux box. If no option is passed to the script i.e..\build.ps1
, then both the boxes are built.
- On Linux/OSX run
- If both the boxes were successfully built, run
vagrant up
to start both. To start any one VM, you can use:vagrant up ub1404
: to start the Linux boxvagrant up win2k8
: to start the Windows 2008 boxvagrant up win2k12
: to start the Windows 2012 boxvagrant up win2k16
: to start the Windows 2016 box
- When this process completes, you should be able to open the VM within VirtualBox and login. The default credentials are U:
vagrant
and P:vagrant
.
- Clone this repo and navigate to the main directory.
- Build the base VM image by running
packer build --only=<provider> ./packer/templates/windows_2008_r2.json
where<provider>
is your preferred virtualization platform. Currentlyvirtualbox-iso
,qemu
, andvmware-iso
providers are supported. This will take a while the first time you run it since it has to download the OS installation ISO. - After the base Vagrant box is created you need to add it to your Vagrant environment. This can be done with the command
vagrant box add packer/builds/windows_2008_r2_*_0.1.0.box --name=metasploitable3-win2k8
. - Use
vagrant plugin install vagrant-reload
to install the reload vagrant provisioner if you haven't already. - To start the VM, run the command
vagrant up win2k8
. This will start up the VM and run all of the installation and configuration scripts necessary to set everything up. This takes about 10 minutes. - Once this process completes, you can open up the VM within VirtualBox and login. The default credentials are U: vagrant and P: vagrant.
Videos:
Thanks to Jeremy, you can also follow the steps in these videos to set up Metasploitable3:
https://www.youtube.com/playlist?list=PLZOToVAK85MpnjpcVtNMwmCxMZRFaY6mT
Using Vagrant and a lightweight Ubuntu 14.04 vagrant cloud box image, you can quickly set up and customize ub1404 Metasploitable3 for development or customization.
To do so, install Vagrant and a hypervisor such as VirtualBox. Then, visit the bento/ubuntu-14.04
page and find a version that supports
your hypervisor. For instance, version v201808.24.0
is compatible with VirtualBox.
Install the vagrant virtualbox vbguest plugin:
vagrant plugin install vagrant-vbguest
Then, navigate to the /chef/dev/ub1404
directory in this repository. Examine the Vagrantfile there. Metasploitable ub1404 uses the vagrant chef-solo
provisioner.
To this Vagrantfile, add the metasploitable chef recipes that you desire -- you can browse them in the /chef/cookbooks/metasploitable
folder. Or,
add or edit your own cookbook and/or recipes there.
From the /chef/dev/ub1404
directory, you can run vagrant up
to get a development virtual ub1404 instance. After the initial up
build and provision,
when you edit the chef runlist or when you edit a chef recipe, run vagrant provision
from the same directory. For faster development, you can comment-out
recipes that you do not need to rerun -- but even if they are all enabled, vagrant provisioning should not take longer one or two minutes.
Chef aims to be idempotent, so you can rerun this command often.
Consider taking a snapshot (e.g., vagrant snapshot new fresh
) before modifying recipes, so that you can always return to an initial state (vagrant restore fresh
).
If you want a totally fresh snapshot, you can do the initialization with vagrant up --no-provision
, then take a snapshot, followed by vagrant provision
.
The wiki has a lot more detail and serves as the main source of documentation. Please check it out.
The Windows portion of this project was based off of GitHub user joefitzgerald's packer-windows project. The Packer templates, original Vagrantfile, and installation answer files were used as the base template and built upon for the needs of this project.