Step by Step guide on installing Metaspoitable3 on Windows using Vagrant (VMware Workstation)

Metaspoitable3 Installation on Windows using Vagrant (VMware Workstation)

What is Metasploitable3?

Metasploitable3 by Rapid7 is a Virtual Machine that is intentionally built to contain many security weaknesses and misconfigurations to serve as a valuable tool for cybersecurity education and training. Allowing us to use it as a target for practicing hacking and penetration testing in a controlled and safe environment. Now that you understand what Metasploitable3 is, let’s proceed with the installation.

In this lab, we are going to install Metasploitable3 VM in VMware Workstation using Vagrant on the Windows Operating System.

The essence of this lab is for you to have a safe and controlled lab environment where you can practice hacking and penetration testing.

Important! Please do not scan systems that do not belong to you or have legal permission to scan.

Click here to download Vagrant. Scroll down to Windows and download based on the version of your Windows Operating System. 32-bit or 64-bit versions. For this example, I am using a 64-bit Windows version. Vagrant requires you to reboot your system after installation. Ensure to reboot your system on the prompt to reboot.

Once rebooted, open your Windows command prompt. Using the following commands, install the vbguest plugins and Vagrant Reload.

vagrant plugin install vagrant-reload

vagrant plugin install vagrant-vbguest

Type this command vagrant box add rapid7/metasploitable3-win2k8 and press enter to add the Metasploitable3 Windows Server
2008 version to your system using Vagrant. Choose option 3 to use the Vmware Workstation. Vagrant will go ahead and download the Windows version of Metasploitable3 from its online repository to your system.

Open Windows Explorer, and locate the downloaded box at C:\Users\username.vagrant.d\boxes. Change the name of the folder from rapid7-
VAGRANTSLASH-metasploitable3-win2k8 to metasploitable3-winsvr2008.

Change your working directory to the location of the folder Metasploitable3 was downloaded.

On your Windows Command Prompt, type cd .vagrant.d\boxes. Next, type vagrant init metasploitable3-winsvr2008 and press enter to start the initialization process.

Tips: If you receive this error “Vagrantfile already exists in this directory. Remove it before running vagrant init.” Run this command vagrant init rapid7/vagrant initmetasploitable3-winsvr2008 –force to overide the existing vagrant. vagrant init {BOX_NAME} –force

Type vagrant up and press enter. Upon the successful completion of the setup process, Import the Windows Version of Metasploitable3 into your Vmware Workstation. Rename your new Metasploitable3 Virtual Machine for easy identification. The default Username is vagrant and the Password is vagrant. Click here to learn more about Metasploitable3’s security vulnerabilities.

Metasploitable3 installation was successful and now you can log in to your new Windows Server 2008 Vulnerable machine with the default Username: vagrant and Password: vagrant. Open the command prompt.

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *


CHAT