Choose and existing hard drive and point it to file C:\VMs\Metasploitable2-Linux\Metasploitable.vmdkĨ. Set the RAM to 512MB (as original VMware machine)ħ. Created a new VM (Metasploitable2) of type Linux/other LinuxĦ. opened VMware machine configuration file (Metasploitable.vmx, an easy to understand text file) to see what the main configuration details are for the VMĥ. downloaded the Metasploitable2-Linux VMĢ. So all the conversion steps you described appear to be useless.ġ. It’s a known feature of VirtualBox its capability to open. I found no issues using the Metasploitable2-Linux hard disk from the VMware VM in a brand new machine created with VirtualBox.
Even it crashes, all we need to do is reboot! The system is now up, All we need to do is change the network settings and make it host-only and we are good to go with a live penetration testing lab on which we can do all kinds of experiments without really worrying about anything. Hence, when this feature is enabled, it solves the problem for us and we are able to run it, thus resolving our major problem. Metasploitable – which again is based on Ubuntu, requires 4GB memory. Following screen shows that system is ready to login for us:ĭefault credentials are msfadmin/msfadmin.Īs per VirtualBox Documentation, if the “Enable PAE/NX” setting is enabled on VirtualBox, and if it is supported by the operating system, then even a 32-bit x86 CPU can access more than 4 GB of RAM. However, upon starting, the following error is displayed:īingo – it worked! One small tweak and now we have Metasploitable running perfectly on VirtualBox. Next, Click on “Exploitable” Virtual Machine and click the “Start” button to start the Virtual Machine as shown in following screenshotį.
Click on create button and If all goes well, we should be able to see the following screenĮ. Once hard disk is selected, our screen should look as follows. Here – we’ll point the VirtualBox image to our converted hard disk. Choose the hard disk by locating the same from local machine. You can modify this if you want I went with the default settings. Enter a name of your choice – I’ve keyed in “exploitable.”ī. Open VirtualBox and Click on Add to create a new Virtual Machine and follow the screenshots in the following order:a.
HOW TO USE NESSUS ON METASPLOIT ABLE2 HOW TO
This step was not very difficult and just by doing a little bit of Googling, I was able to find out how to convert the VMware image to VirtualBox.
HOW TO USE NESSUS ON METASPLOIT ABLE2 ISO
I normally use an ISO file and load it up in VirtualBox. The first step for me was to convert the VMware image to the VirtualBox image. We’ll also troubleshoot the problems as we face them. The following section will explain each of the steps in detail. This article will only focus on getting the vulnerable machine up and running in an already existing VirtualBox installation. It is left as an exercise for the end user.
We will not cover the installation aspects of VirtualBox, either. By end of the article, we’ll have a VirtualBox image up and running without any problem.Ī detailed description of VirtualBox, VM ware or Metasploitable is out of the scope of this article. This article can be used as a hands-on guide I’ll explain step by step how to set up the virtual machine, the problem I faced, and how I resolved it. The objective of this article is to share my experience with all fellow penetration testers who want to use Metasploitable 2, but are facing the same issue that I did. The first one was a bit easier compared to the second one and this is where I was stuck, as there was no documentation available on how to resolve this problem.