Skip to content

πŸ’» Step-by-step guide to install and run Metasploitable 2 on Mac with Apple Silicon (M1/M2/M3) using UTM β€” ideal for ethical hacking labs, penetration testing practice, and cybersecurity students.

Notifications You must be signed in to change notification settings

jameskaois/install-metasploitable2-on-mac-apple-silicon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

5 Commits
Β 
Β 
Β 
Β 

Repository files navigation

πŸ’₯ Install Metasploitable 2 on Mac (Apple Silicon) with UTM

A step-by-step guide to install and run Metasploitable 2 on Mac with Apple Silicon (M1, M2, M3, etc.) using UTM. Ideal for ethical hacking, penetration testing, and cybersecurity students.

metasploitable2


πŸ“Œ Note: As of now, only UTM reliably supports running Metasploitable 2 on Macs with Apple Silicon (M1, M2, M3, etc.). VirtualBox and VMware do not support x86 virtual machines on Apple Silicon natively.

πŸ—“ Updated: July 24, 2025


πŸ“š Table of Contents


🧠 What is Metasploitable 2?

Metasploitable 2 is a deliberately vulnerable Linux-based virtual machine created by Rapid7 for penetration testing practice. It's widely used in cybersecurity labs.


πŸ–₯️ Why UTM for Apple Silicon Macs?

Apple Silicon (M1, M2, M3) doesn’t natively support x86 VMs in VirtualBox or VMware. UTM is the best free and open-source virtualization tool for running x86 operating systems on Apple Silicon.


πŸ“¦ Requirements

  • βœ… Mac with Apple Silicon (M1, M2, M3…)
  • βœ… UTM
  • βœ… Metasploitable 2 .iso or .vmdk file (download below)

πŸ”½ Download Metasploitable 2

  1. Go to official source
  2. Download the Metasploitable2.vmdk.zip
  3. Extract the metasploitable-linux-2.0.0.zip file

Guide Image


βš™οΈ Step-by-Step Installation (Using UTM)

1. Open UTM and Create a New VM

  • Click Create a New Virtual Machine

Guide Image

  • Select Emulate

Guide Image

  • Select Other

Guide Image

  • Select Boot Device: None

Guide Image

2. System Configuration

  • Architecture: x86_64
  • System: Leave default (or choose x86-compatible)
  • Memory: 1024 MiB or more
  • Select Continue

Guide Image

  • Storage: 2 GiB
  • Select Continue

Guide Image

  • Select Continue

Guide Image

  • Type Name: Metasploitable 2
  • Check Open VM Settings
  • Click Save

Guide Image

3. QEMU Settings

  • Go to QEMU
  • Uncheck UEFI Boot

Guide Image

4. Network Settings

  • Go to Network
  • Set Network Mode: Bridged (Advanced)

πŸ“Œ Important: Make sure your Kali Linux or other VM is also set to Bridged mode so it can communicate with Metasploitable 2 over the network.

Guide Image

5. Drives Settings

  • Right Click and Delete IDE Drive

Guide Image

  • Click New -> Import
  • Choose file Metasploitable.vmdk (in the folder you unzip when download Metasploitable)
  • Click Open

Guide Image

  • Click Save and then you have successfully created your Metasploitable VM.

Guide Image

6. Finalize

  • Start your Metasploitable 2 machine
  • Default credentials:
  • Login: msfadmin
  • Password: msfadmin
  • To verify networking, run:
ifconfig

In order to see the IP address of your Metasploitable 2 VM.

πŸ™Œ Author

Made by James Cao – cybersecurity & ethical hacking student.

Feel free to ⭐ the repo if it helped you!

About

πŸ’» Step-by-step guide to install and run Metasploitable 2 on Mac with Apple Silicon (M1/M2/M3) using UTM β€” ideal for ethical hacking labs, penetration testing practice, and cybersecurity students.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published