Homelab setup ,Exploiting and penetrating of Metasploitable 2
Project consists of creating a Homelab , Adding greenbone a vulnerability scanner and exploiting and penetrating of metasploitable 2- Kali linux
- Metasploitable 2
Launch the metasploitable:
Find ip Address using "ifconfig on our metasploitable " Command:
Launch Kali linux and check ip address to confirm its on same network as metasploitable2:
Scan our network to detect the metasploitable using the "nmap" command:
We do a ping scan to determine which hosts are listening in the network using the "nmap -n" command
Do a "sudo apt update" to update all kali dependecies & Wait for process to complete (may take some time):
We install Green bone using the command "sudo apt install gvm -y":
we install all the databases,create permissions, and install services for greenbone to work using the command "sudo gvm-setup":
We open up our web browser and go to the web address "http://127.0.0.1:9392" , accept risks .
We login using the default username "admin" and password.
To reset your password if you don't remember it use the command "sudo runuser -u_gvm -- gvmd --user=admin --new-password="input new password here"
To start up OPENVAS by Greenbone use the command "sudo gvm-start"
UNFINISHED: