It is left as an exercise for the end user. This article will only focus on getting the vulnerable machine up and running in an already existing VirtualBox installation.
The following section will explain each of the steps in detail. The first step for me was to convert the VMware image to the VirtualBox image. This is the first time I came across a VMware image itself and I had to run it. This step was not very difficult and just by doing a little bit of Googling, I was able to find out how to convert the VMware image to VirtualBox. One can use the following command for image conversion: VBoxManage clonehd Metasploitable.
The above command will do the conversion — which can be seen in following screenshot:. Once the above command completes, we have a VirtualBox compatible hard disk ready no. All we need to do is create a new virtual machine and fire it up. Next we can choose the memory. By default, it is MB. You can modify this if you want; I went with the default settings.
Choose the hard disk by locating the same from local machine. Once hard disk is selected, our screen should look as follows. Click on create button and If all goes well, we should be able to. Now this is disappointing. After reaching here, if we are unable to boot, then it waters down all our efforts. Metasploitable, yes Metasploitable is the OS which is the easiest to hack in and look after the information of the OS. Before I should start the installation of the OS, I will define the OS, and I will say how to use this OS and where to use and where not to use that because it can be dangerous for you also.
To install Metasploitable in VirtualBox at first, we need to know what is Metasploitable. Metasploitable is a purposely vulnerable Linux machine which is used to test security tools and test conventional penetration testing methods on it.
It will look just like a command prompt in Windows and as a terminal in Linux. Fill registration. Click here to download. Extract The File. Click on a new button. RAM Size. Select Hard disk type. User icon An illustration of a person's head and chest. Sign up Log in. Web icon An illustration of a computer application window Wayback Machine Texts icon An illustration of an open book.
Books Video icon An illustration of two cells of a film strip. Video Audio icon An illustration of an audio speaker. User Ratings 4.
User Reviews Filter Reviews: All. I've been using this Operating System for months now and I feel like my personal data keeps going missing and I have unusual amounts of network traffic.
Came highly recommended to be used as part of ethical hacking tutorial. Metasploitable is excellent! Report inappropriate content. Thanks for helping keep SourceForge clean. X You seem to have CSS turned off. Briefly describe the problem required :. Upload screenshot of ad required :.
0コメント