Metasplotable3 简易安装教程

点击此处阅读原文

Introduction

Metasplotable3 相比 Metasplotable2 更为强大,其安装方法也繁琐复杂了许多,以下就自己的安装经历做简要总结。

Install in VirtualBox

  1. 安装VirtualBox及其扩展包:

  2. 安装Vagrant

    安装后重启,会自动将vagrant添加至系统环境变量。

  3. 下载 metasploitable3 相关文件

    git clone https://github.com/rapid7/metasploitable3.git

    将以下内容替换 /metasploitable3-master/Vagrantfile 中的内容:

    
    # -*- mode: ruby -*-
    
    
    # vi: set ft=ruby :
    
    
    
    # All Vagrant configuration is done below. The "2" in Vagrant.configure
    
    
    # configures the configuration version (we support older styles for
    
    
    # backwards compatibility). Please don't change it unless you know what
    
    
    # you're doing.
    
    Vagrant.configure("2") do |config|
      # The most common configuration options are documented and commented below.
      # For a complete reference, please see the online documentation at
      # https://docs.vagrantup.com.
    
      # Every Vagrant development environment requires a box. You can search for
      # boxes at https://atlas.hashicorp.com/search.
      config.vm.box = "Metasploitable3"
      #config.vm.box_version = "0.1.0"
      config.vm.provider :virtualbox do |vb|
          vb.name = "Metasploitable 3"
      end
      config.vm.hostname = "Metasploitable3"
      config.vm.communicator = "winrm"
      config.winrm.retry_limit = 60
      config.winrm.retry_delay = 10
    
      # The url from where the 'config.vm.box' box will be fetched if it
      # doesn't already exist on the user's system.
      # config.vm.box_url = "file:///D:/VPC/Metasploitable3-src/windows_2008_r2_virtualbox-iso.box"
    
      # Create a forwarded port mapping which allows access to a specific port
      # within the machine from a port on the host machine. In the example below,
      # accessing "localhost:8080" will access port 80 on the guest machine.
      # config.vm.network "forwarded_port", guest: 80, host: 8080
    
      # Create a private network, which allows host-only access to the machine
      # using a specific IP.
      # config.vm.network "private_network", ip: "192.168.33.10"
    
      # Create a public network, which generally matched to bridged network.
      # Bridged networks make the machine appear as another physical device on
      # your network.
      # config.vm.network "public_network"
    
      # Share an additional folder to the guest VM. The first argument is
      # the path on the host to the actual folder. The second argument is
      # the path on the guest to mount the folder. And the optional third
      # argument is a set of non-required options.
      # config.vm.synced_folder "../data", "/vagrant_data"
    
      # Provider-specific configuration so you can fine-tune various
      # backing providers for Vagrant. These expose provider-specific options.
      # Example for VirtualBox:
      #
      # config.vm.provider "virtualbox" do |vb|
      #   # Display the VirtualBox GUI when booting the machine
      #   vb.gui = true
      #
      #   # Customize the amount of memory on the VM:
      #   vb.memory = "1024"
      # end
      #
      # View the documentation for the provider you are using for more
      # information on available options.
    
      # Define a Vagrant Push strategy for pushing to Atlas. Other push strategies
      # such as FTP and Heroku are also available. See the documentation at
      # https://docs.vagrantup.com/v2/push/atlas.html for more information.
      # config.push.define "atlas" do |push|
      #   push.app = "YOUR_ATLAS_USERNAME/YOUR_APPLICATION_NAME"
      # end
    
      # Enable provisioning with a shell script. Additional provisioners such as
      # Puppet, Chef, Ansible, Salt, and Docker are also available. Please see the
      # documentation for more information about their specific syntax and use.
      # config.vm.provision "shell", inline: <<-SHELL
      #   apt-get update
      #   apt-get install -y apache2
      # SHELL
    end
    
  4. 下载 metasploitable3-win2k8.box

  5. 构建metasploitable3的vagrant环境

    在metasploitable3-win2k8.box目录下执行:

    vagrant box add metasploitable3-win2k8.box --name Metasploitable3

    执行完毕后会在 C:\user\xxx\vagrant\boxes\Metasploitable3\0\ 中生成 metasploitable3-win2k8-disk001.vmdk,至此,可以直接复制该vmdk文件到其它地方,直接在virtualbox中使用现有虚拟硬盘新建虚拟机,即可使用

  6. 使用vagrant添加并运行虚拟机

    在/metasploitable3-master/中执行:

    vagrant plugin install vagrant-reload

    启动虚拟机

    vagrant up

SAINTSEC教你玩转Metasploitable 3:http://www.freebuf.com/sectool/122626.html

你可能感兴趣的:(virtualbox,vagrant,metasploit,杂谈)