

This document outlines many of the security flaws in the Metasploitable 2 image. (Note: A video tutorial on installing Metasploitable 2 is available here.) By default, Metasploitable's network interfaces are bound to the NAT and Host-only network adapters, and the image should never be exposed to a hostile network.

This virtual machine is compatible with VMWare, VirtualBox, and other common virtualization platforms. Version 2 of this virtual machine is available for download and ships with even more vulnerabilities than the original image.

The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities.
