Installing Vulnerable Virtual Machine

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 4

Remember I told you that we must have vulnerable machines that we can scan and

before we actually proceed


to performing, scanning and covering different tools that people use.

Let us first see where we can get a vulnerable machine and how we can install it.
Veamos primero dónde podemos conseguir una máquina vulnerable y cómo podemos
instalarla.

And trust me, it is pretty easy, so just type top10 vulnerable machines and you
will see this rapid
seven link that says 10 places to find vulnerable machines for your lap.
Y créeme, es bastante fácil, así que sólo escribe top10 máquinas vulnerables y
verás este enlace de rapid seven
que dice 10 lugares para encontrar máquinas vulnerables para tu laptop.

Click on that link.


Haga clic en ese enlace.

And down here, if I scroll all the way down, I should see a list of 10 different
vulnerable machines
that we can use as a hacker to practice our skills.
Y aquí abajo, si me desplazo hasta el final, debería ver una lista de 10 máquinas
vulnerables diferentes
que podemos utilizar como hacker para practicar nuestras habilidades.

And for this action, we're going to be going with the first one, so the name of it
is metastable,
click on it and it will route you to another page of Rapid Seven website, and it
will tell you Matus
political virtual machine to test.

You can read this if you want, as it tells you some of the information about the
matters political,
but what's the most important part is down here in order to download this machine,
you must fill in
this information.
Puedes leer esto si quieres, ya que explica parte de la información sobre los
asuntos políticos,
pero lo más importante es que aquí abajo, para poder descargar esta máquina,
debes rellenar esta información.

Now, it is up to you what information you will feel right here.


Ahora, depende de ti la información que vayas a introducir aquí.

But as soon as you fill all of this, you can click on submit and it will lead you
to a page where you
can download metastable up here.
Pero tan pronto como usted llene todo esto, puede hacer clic en enviar y esto le
llevará a una página donde podrá
podra descargar metaesplotable aquí.

It tells us that Anticipatable is free to use after we fill out the form.

So this is something that you must do in order to download it from the official
website.
Así que esto es algo que debes hacer para descargarlo de la página oficial.

And after you finish downloading it, you should finish up with a file that looks
something like this
sommat disputable Linux zip you want to extract this, far as you can see, I have
already extracted
it.
Una vez descargarlo, debería obtener un archivo que se parece a este zip de
sommat disputable Linux que desea extraer, como puede ver,
ya lo he extraído.

And you should see these files right here.


Y deberías ver estos archivos aquí.

This Vindicator file is our hard disk that we are going to use in a virtual
machine.
Este archivo Vindicator es nuestro disco duro que vamos a utilizar en una máquina
virtual.

So let's see how we can install it.


Así que vamos a ver cómo podemos instalarlo.

Go open up your virtual box.


Ve a abrir tu virtual box.

And we want to be creating a new virtual machine, we already know how to do that.
Y a continuación creamos una nueva máquina virtual, ya sabemos cómo hacerlo.

Click on this button right here and it will ask us for the name of our time machine
and the operating
system.
Haz clic en este botón de aquí y nos pedirá el nombre de nuestra máquina virtual y
el sistema operativo.

You can name it anything you want to just name it matters political to, and the
reason why I'm naming

it to is because I already have it installed right here.

So the names differ.


Así que los nombres difieren.

In the type of operating system you want to select Linux and in the version of
operating system, you
want to scroll all the way down and select other Linux 64 bit once you got the
settings ready.
En el tipo de sistema operativo que desea seleccionar Linux y en la versión del
sistema operativo,
desplazarse hacia abajo y seleccionar otro Linux de 64 bits una vez que tienes la
configuración lista.

Click on next.
Haga clic en siguiente.

And this is what they talked about.

These virtual machines will use very little hardware resources from your physical
machine.

That's why for this virtual machine, for them anticipatable, we can leave five
hundred and twelve
megabytes of RAM.

It is more than enough for this machine to run.

It will even work if you lower it to two hundred and fifty six megabytes ram.

But five hundred and twelve is recommended.

So let us leave it on five hundred twelve.

And if you don't have this much ram to use you can leave it on two hundred and
fifty six, then proceed

to next and in the step instead of creating a virtual hard disk.

Now we want to use an existing virtual hard disk.

Once you select this option, click on this icon right here and click on ADD.

Then find your hard disk forever.

You got to download it, for example, I got it on my desktop right here.

Here it is.

Find this VMT Kaifa, select it and then select it right here on again and click on
Choose.

Once you do that, you can click on Create, and this is pretty much it, we got our
the created, all

we are left to do right now are two things.

The first thing is navigate the settings.

Go to the network settings and switch from that to bridge adapter, the same thing
we did with our Linux

machine, then choose your adapter and click on OK.

This will just make government split about to IP address belonging to the IP range
of our network.

Once you do that, click on START.

And this will start the process of installing metal portable for you, unlike in
clinics right here,

you don't need to do anything.

This will install machine on its own and it will take about a minute or two, maybe
even less.

So at the end, after this finishes, it should prompt us with a login and you will
notice that this

machine doesn't have a desktop or anything else.

It is a command line machine.


That means we can only navigate through this machine using commands.

And those commands are simply terminal comments.

So just picture this as one big terminal.

As we can see, the installation has finished and down here we got to split the log
in.

And if you read through this website right here.

If you read through this paragraph, it tells us right here that the metastable
logging is massive Admon

and the password is also a admin.

So let's try it out, go to our machine type MSF admin and under password, again,
MSF admin.

And here we are.

We managed to log in to our room at this point just to check up on network type of
config and it will

tell me that my IP addresses wanted to do that 168 at one to three.

That is because we set it to be over breached adapter.

And if we try to ping Google, for example, it will work, so our machine is set up
and it is ready

to be scanned and attacked.

You see, this was pretty simple to do, and in the next video, we are ready to start
our scanning

process.

See you there.

You might also like