Skip to content
Tijl Deneut edited this page Aug 3, 2017 · 1 revision

Introduction

Target: exactly same as Metasploitable3 from Rapid7, but with a fix

Installation

Very simple Setup readme (tested within Windows 10 VM):

FYI: When running in a VM, make sure the VM has 8GB RAM & 4 vCPU's and has VT-x enabled.
When the CMD seems stuck, just press enter a couple of times

Open elevated CMD in metaspoitable3 directory:
cmd> vagrant plugin install vagrant-reload
cmd> powershell set-executionpolicy bypass && powershell .\build_win2008.ps1
Will download 2008 ISO, create VBox VM, launch it and configure it
--> Whenever a Firewall pops up in the "host" (Win10), press cancel

Just wait, there should be a VirtualBox window to follow all reboots ...
What will happen: a VM is created and everything installed, including runonce scripts inside the VM...
Then the VM will be packaged (compacted etc ...) to an ovf and the Original deleted!
Then the OVF will be packaged to a "BOX" (vagrant box) and that's it.

When all is done, run (still from metasploitable folder!)
cmd> vagrant up

--> This will take some time (again) but the VM runs, altough in NAT and without a GUI, in this case this means it's pretty much useless
When opening VirtualBox at this time, there may be errors (VM doesn't seem to run etc ...).
So first stop it properly:
cmd> vagrant halt

Now start the GuestVM from VirtualBox and possibly configure bridge adapter first?

When is it OK?

When performing a full TCP port scan, these should be visible:
22/tcp open ssh
1617/tcp open nimrod-agent
3000/tcp open ppp
4848/tcp open appserv-http
5985/tcp open wsman
8020/tcp open intu-ec-svcdisc
8022/tcp open oa-system
8027/tcp open unknown
8080/tcp open http-proxy
8282/tcp open libelle
8383/tcp open m2mservices
8484/tcp open unknown
8585/tcp open unknown
9200/tcp open wap-wsp
And a couple of 49000+ ports (common for Windows, may differ)
49153/tcp open unknown
49154/tcp open unknown
49159/tcp open unknown
49161/tcp open unknown

Clone this wiki locally