


Next we scan all ports on the target host using the command nmap -Pn -n -sV -vv -p1-65535 -open 10.10.10.101. The previous command does not have to be processed so much, but it does provide an output that can be used in scripts in future. We can now proceed further to identify services running on that host using a port scanner such as nmap. We can thus grep this to only get IP addresses, e.g. Since we used the -P switch netdiscover produces a parsable output. Since the eth1 interface on the Kali VM is connected to the vlannet, and we know that the subnet for that interface is 10.10.10.0/24, we can run the following command :~# netdiscover -i eth1 -r 10.10.10.0/24 -P We use the netdiscover utility to identify the hosts on the network. Preparationįirst, attempt to identify the target.

I disconnected the second interface (eth1), and connected the first interface |0A|0ATo contact the developers, please send email to |0A|0A |0A|0ANever expose this VM to an untrusted network (use NAT or Host-only mode if you have any questions what that means).
#VMWARE MAC ADDRESS 0A 00 27 00 00 09 PASSWORD#
|0A|0AThe default login and password is msfadmin:msfadmin. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. vmx file to get the system specification, but I have summarised below forĭesc: This is Metasploitable2 (Linux)|0A|0AMetasploitable is an intentionally vulnerable Linux virtual machine. We will need theseįiles to create a virtual machine within VirtualBox.Ĭreate a new virtual machine in VirtualBox. Locate the contents of the Metasploitable2-Linux directory. apt-get autoremove -purgeĭownload the current version of metasploitable 2 from the repository
#VMWARE MAC ADDRESS 0A 00 27 00 00 09 INSTALL#
So the walk-through is just me pretending to apply some arbitraty penetration testing approaches to the Metasploitable2 VM.Īlso to make it easier to copy and mast between the Kali VM and the host machine to run Internet searched, it may be useful to install Virtualbox Guest Additions and share the clipboard. To verify that the DHCP server is available for the internal network, run VBoxManage.exe list dhcpservers, which should list the DHCP servers available for the respective networks. The following command may be used to setup the DHCP server. There is a DHCP server on the virtual lab network to dynamically allocate IP addresses to hosts.

Both VMs have their network interfaces connected to an internal Virtualbox network called vlabnet. The first is a Kali VM and the second is the Metasploitable2 VM. This metasploitable walk-through is performed in a virtual lab environment. Since this is a mock exercise, I leave out the pre-engagement, post-exploitation and risk analysis, and reporting phases. I employ the following penetration testing phases: reconnaisance, threat modelling and vulnerability identification, and exploitation. Tags: kush notes metasploit metasploitable metasploitable2 virtualbox vboxmanage nmap db_nmapįor this walk-though I use the Metasploit framework to attempt to perform a penetration testing exercise on Metasploitable 2.
