Skip to content

Ruxx0/Basic-Homelab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 

Repository files navigation

Basic-Homelab

Homelab setup ,Exploiting and penetrating of Metasploitable 2

Description

Project consists of creating a Homelab , Adding greenbone a vulnerability scanner and exploiting and penetrating of metasploitable 2

Environments Used

  • Kali linux
  • Metasploitable 2

Program walk-through:

Launch the metasploitable:
Homelab setup & penetrating metasploitable Steps

Find ip Address using "ifconfig on our metasploitable " Command:
Homelab setup & penetrating metasploitable Steps

Launch Kali linux and check ip address to confirm its on same network as metasploitable2:
Homelab setup & penetrating metasploitable Steps

Scan our network to detect the metasploitable using the "nmap" command:
Homelab setup & penetrating metasploitable Steps

We do a ping scan to determine which hosts are listening in the network using the "nmap -n" command
Homelab setup & penetrating metasploitable Steps

Do a "sudo apt update" to update all kali dependecies & Wait for process to complete (may take some time):
Homelab setup & penetrating metasploitable Steps

We install Green bone using the command "sudo apt install gvm -y":
Homelab setup & penetrating metasploitable Steps

we install all the databases,create permissions, and install services for greenbone to work using the command "sudo gvm-setup":
Homelab setup & penetrating metasploitable Steps

We open up our web browser and go to the web address "http://127.0.0.1:9392" , accept risks .
Homelab setup & penetrating metasploitable Steps Homelab setup & penetrating metasploitable Steps

We login using the default username "admin" and password.
Homelab setup & penetrating metasploitable Steps

To reset your password if you don't remember it use the command "sudo runuser -u_gvm -- gvmd --user=admin --new-password="input new password here"
Homelab setup & penetrating metasploitable Steps

To start up OPENVAS by Greenbone use the command "sudo gvm-start"
Homelab setup & penetrating metasploitable Steps

UNFINISHED:
Disk Sanitization Steps

About

Exploiting and penetrating of Metasploitable 2

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published