SlideShare a Scribd company logo
Project 3: Setting Up VMs (15 points)
You need to set up these three virtual machines:
1. Kali Linux 2.0 with Nessus and additional software
2. Windows Server 2008 with several vulnerable software packages
3. Metasploitable 2
Installing VMware
If you are working in S214, VMware is already installed. If you are using some other machine, you need to install some
virtualization software. I recommend VMware.
Download VMware Player
VMware Fusion for Mac OS X: https://www.vmware.com/products/fusion/
Downloading VMs
Download the three VMs shown below. Each of them is a 7-zip archive.
Download metasploitable Size: 865,084,584
SHA-256: 2ae8788e95273eee87bd379a250d86ec52f286fa7fe84773a3a8f6524085a1ff
Download Win2008-124 Size: 2,180,234,212
SHA-256: dc496623ef74fe1dac1dfb3053acea312350f02d83189bd15d2b48d6eb49be22
Download Kali Linux 32 bit VM PAE
Getting 7-Zip
7-Zip is installed in S214. If you need to get it, use these links:
7-Zip for Windows: http://www.7-zip.org/
Ez7z for Mac OS X: https://samsclass.info/124/proj14/ez7z214.dmg
Using VirtualBox
Some students prefer to use VirtualBox. If you want to do that, these links should help:
How to Download and Install Metasploitable in VirtualBox
Download Kali Linux VirtualBox Images
VM 1: Kali Linux and Nessus
Unzip the Kali file and launch the VM.
Logging In to Kali Linux
The default username is root
The default password is toor
Turning off "Blank Screen" in Kali
By default, Kali 2.0 will keep locking the screen after a few seconds of inactivity, which is irritating. To fix this, on the left
side of the Kali 2.0 desktop, click the bottom button to "Show Applications", as shown below.
On the right side of the Kali 2.0 desktop, click the lowest circle to show the bottom screen.
Then click Settings, as shown below.
In the "All Settings" window, click Power.
Set "Blank screen" to Never, as shown below.
Testing Networking
Open a Terminal window and ping google.com, as shown below. You should get replies.
Capturing a Screen Image
Make sure the Kali desktop is visible, as shown above.
Click in the host system, capture a whole-desktop image, and save it as "Proj 3a".
YOU MUST SEND IN A WHOLE-DESKTOP IMAGE FOR FULL CREDIT
VM 2: Windows 2008 with Vulnerable Software
Unzip the Win2008-124.7z file you downloaded above. Launch the VM. It will automatically log in, but for future
reference the default username is Administrator and the default password is P@ssw0rd
VirtualBox Instructions
If you prefer to use VirtualBox, download this file:
Win2008-124-ovf.7z Size: 3,839,642,200
SHA-256: b4ac58beba22561845ab09153d7fa5c22600561a3b61c9626020c1138a6c5c77
Unzip it. Then open VirtualBox and click File, "Import Appliance". Navigate to the
Win2008-124.ovf file, and click Continue.
In the "Appliance settings" box, make these adjustments:
Name: Win2008-124
Guest OS Type: Windows 2008 (32-bit)
Video Memory: 128 MB
Storage: Remove the 102 MB disk
Click Import.
The new VM appears in the list, and you can start it normally.
Viewing Listening Ports
In Windows Server 2008, open a Command Prompt window, maximize it, and execute this command:
netstat -an | findstr LISTEN
You should see the three listening ports shown below (21, 25, and 80), among others.
Capturing a Screen Image
Make sure the three listening ports shown above are visible.
Capture a whole-desktop image and save it as "Proj 3b".
YOU MUST SEND IN A WHOLE-DESKTOP IMAGE FOR FULL CREDIT
VM 3: Metasploitable
Unzip the metasploitable file you downloaded above and launch the VM. Log in with the default credentials: username
and password both msfadmin
VirtualBox Instructions
If you prefer to use VirtualBox, download this file:
Metasploitable2-vbox.7z Size: 692,100,274
SHA-256: 02b128198cb9db2304f0cf45061f186abf326350e6d3dc6da1cebae66027d59d
Unzip it to create a Metasploitable2-Linux.vdi file.
Then open VirtualBox and click Machine, New.
In the "Name and operating system" box, make these entries:
Name: Metasploitable2
Type: Linux
Version: Ubuntu (32-bit)
Click Continue.
In the "Memory size" box, accept the default selection and click Continue.
In the "Hard disk" box, click the "Use an existing virtual hard disk file" button, click the
little folder icon, and navigate to the Metasploitable2-Linux.vdi file. Click Open. Click
Create.
The new VM appears in the list, and you can start it normally.
A text-only console is visible, as shown below.
Capturing a Screen Image
Make sure the "Linux metasploitable" message is visible, as shown above.
Capture a whole-desktop image and save it as "Proj 3c".
YOU MUST SEND IN A WHOLE-DESKTOP IMAGE FOR FULL CREDIT
Turning in Your Project
Email the images to cnit.124@gmail.com with a subject line of "Proj 3 From YOUR NAME", replacing "YOUR
NAME" with your real name.
Send a Cc to yourself.
Last Modified: 8-28-17 5 pm

More Related Content

PDF
Run mac os x on pc
PPTX
Mac osx snow leopard 10
DOCX
rgpv 7th sem for it & cs Cloud computing lab record
PPT
Installing virtual box and windows server 2008 R2
DOCX
Virtualbox step by step guide
DOCX
Wbadmin
PDF
How to boot a VM form a Forensic Image
Run mac os x on pc
Mac osx snow leopard 10
rgpv 7th sem for it & cs Cloud computing lab record
Installing virtual box and windows server 2008 R2
Virtualbox step by step guide
Wbadmin
How to boot a VM form a Forensic Image

What's hot (20)

PDF
Intoduction to VirtualBox English
DOCX
Creating ubuntu virtual machin on oracle vm
PDF
1 installing ubuntu1404-lts_on_virtualbox
PDF
How to Create a Windows Server 2008 Virtual Lab Using VirtualBox
DOCX
V mware error
PDF
VMworld 2013: What's New in VMware Fusion
PDF
Running virtual box from the linux command line
DOCX
Windows thin pc
PDF
Install a micro k8s single node cluster of kubernetes on windows 10
PPT
IT103Microsoft Windows XP/OS Chap02
PDF
Azure vm resizing the os disk
PDF
Linux install
PDF
Virtualbox
PPTX
GNS3- A Brief User Guide
ODP
ClusterDesktop how-to use from iPhone / iPad
PDF
514412 windows-7-installation-guide-tutorial.html-780931481
PPTX
Let’s talk virtualization
PDF
Router Virtualization With GNS3
PDF
Virtual Box Sharepoint2010
Intoduction to VirtualBox English
Creating ubuntu virtual machin on oracle vm
1 installing ubuntu1404-lts_on_virtualbox
How to Create a Windows Server 2008 Virtual Lab Using VirtualBox
V mware error
VMworld 2013: What's New in VMware Fusion
Running virtual box from the linux command line
Windows thin pc
Install a micro k8s single node cluster of kubernetes on windows 10
IT103Microsoft Windows XP/OS Chap02
Azure vm resizing the os disk
Linux install
Virtualbox
GNS3- A Brief User Guide
ClusterDesktop how-to use from iPhone / iPad
514412 windows-7-installation-guide-tutorial.html-780931481
Let’s talk virtualization
Router Virtualization With GNS3
Virtual Box Sharepoint2010
Ad

Similar to setting up v ms (20)

PDF
Booting an image as a forensically sound vm in virtual box
PDF
12849144 how-to-install-a-cccam-server-on-windows
DOCX
How to Install Proxmox on Debian 12_ .docx
DOCX
Dual boot with a vhd final
PDF
Netezza All labs
DOCX
Krenel Based Virtual Machine In Centos7
PPTX
Virtualization technology "comparison vmware 9 vs virtualbox 4.2"
PPTX
Vmware esxi and ucs firmware upgrade steps and challenges v4.10
PDF
StoneFly-SCVM-Hyper-V-VM.pdf StoneFly-SCVM-Hyper-V-VM
DOCX
Installation of oracle 12c RAC on linux vm
DOCX
Installation of wampserver
DOCX
bcm20702a0-driver-windows-11.docx
PDF
Osr506on esx
DOCX
Handson1 6 federp
DOCX
MDT Step public
DOC
SOP - 2013 Server Build
PDF
VMware Workstation 9.0.1 Build 894247 Final Keygen
PDF
NetBSD on Google Compute Engine (en)
DOCX
Hacking windows xp sp 2 using metasploit
PDF
The Holy Grail of Deployment
Booting an image as a forensically sound vm in virtual box
12849144 how-to-install-a-cccam-server-on-windows
How to Install Proxmox on Debian 12_ .docx
Dual boot with a vhd final
Netezza All labs
Krenel Based Virtual Machine In Centos7
Virtualization technology "comparison vmware 9 vs virtualbox 4.2"
Vmware esxi and ucs firmware upgrade steps and challenges v4.10
StoneFly-SCVM-Hyper-V-VM.pdf StoneFly-SCVM-Hyper-V-VM
Installation of oracle 12c RAC on linux vm
Installation of wampserver
bcm20702a0-driver-windows-11.docx
Osr506on esx
Handson1 6 federp
MDT Step public
SOP - 2013 Server Build
VMware Workstation 9.0.1 Build 894247 Final Keygen
NetBSD on Google Compute Engine (en)
Hacking windows xp sp 2 using metasploit
The Holy Grail of Deployment
Ad

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
A Presentation on Artificial Intelligence
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Tartificialntelligence_presentation.pptx
PPT
Teaching material agriculture food technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Spectroscopy.pptx food analysis technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Assigned Numbers - 2025 - Bluetooth® Document
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
Accuracy of neural networks in brain wave diagnosis of schizophrenia
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A Presentation on Artificial Intelligence
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Electronic commerce courselecture one. Pdf
NewMind AI Weekly Chronicles - August'25-Week II
Per capita expenditure prediction using model stacking based on satellite ima...
A comparative analysis of optical character recognition models for extracting...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine Learning_overview_presentation.pptx
Tartificialntelligence_presentation.pptx
Teaching material agriculture food technology
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
Spectroscopy.pptx food analysis technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

setting up v ms

  • 1. Project 3: Setting Up VMs (15 points) You need to set up these three virtual machines: 1. Kali Linux 2.0 with Nessus and additional software 2. Windows Server 2008 with several vulnerable software packages 3. Metasploitable 2 Installing VMware If you are working in S214, VMware is already installed. If you are using some other machine, you need to install some virtualization software. I recommend VMware. Download VMware Player VMware Fusion for Mac OS X: https://www.vmware.com/products/fusion/ Downloading VMs Download the three VMs shown below. Each of them is a 7-zip archive. Download metasploitable Size: 865,084,584 SHA-256: 2ae8788e95273eee87bd379a250d86ec52f286fa7fe84773a3a8f6524085a1ff Download Win2008-124 Size: 2,180,234,212 SHA-256: dc496623ef74fe1dac1dfb3053acea312350f02d83189bd15d2b48d6eb49be22 Download Kali Linux 32 bit VM PAE Getting 7-Zip 7-Zip is installed in S214. If you need to get it, use these links: 7-Zip for Windows: http://www.7-zip.org/ Ez7z for Mac OS X: https://samsclass.info/124/proj14/ez7z214.dmg Using VirtualBox Some students prefer to use VirtualBox. If you want to do that, these links should help: How to Download and Install Metasploitable in VirtualBox Download Kali Linux VirtualBox Images VM 1: Kali Linux and Nessus Unzip the Kali file and launch the VM. Logging In to Kali Linux The default username is root The default password is toor
  • 2. Turning off "Blank Screen" in Kali By default, Kali 2.0 will keep locking the screen after a few seconds of inactivity, which is irritating. To fix this, on the left side of the Kali 2.0 desktop, click the bottom button to "Show Applications", as shown below. On the right side of the Kali 2.0 desktop, click the lowest circle to show the bottom screen. Then click Settings, as shown below. In the "All Settings" window, click Power. Set "Blank screen" to Never, as shown below. Testing Networking
  • 3. Open a Terminal window and ping google.com, as shown below. You should get replies. Capturing a Screen Image Make sure the Kali desktop is visible, as shown above. Click in the host system, capture a whole-desktop image, and save it as "Proj 3a". YOU MUST SEND IN A WHOLE-DESKTOP IMAGE FOR FULL CREDIT VM 2: Windows 2008 with Vulnerable Software Unzip the Win2008-124.7z file you downloaded above. Launch the VM. It will automatically log in, but for future reference the default username is Administrator and the default password is P@ssw0rd VirtualBox Instructions If you prefer to use VirtualBox, download this file: Win2008-124-ovf.7z Size: 3,839,642,200 SHA-256: b4ac58beba22561845ab09153d7fa5c22600561a3b61c9626020c1138a6c5c77 Unzip it. Then open VirtualBox and click File, "Import Appliance". Navigate to the Win2008-124.ovf file, and click Continue. In the "Appliance settings" box, make these adjustments: Name: Win2008-124
  • 4. Guest OS Type: Windows 2008 (32-bit) Video Memory: 128 MB Storage: Remove the 102 MB disk Click Import. The new VM appears in the list, and you can start it normally. Viewing Listening Ports In Windows Server 2008, open a Command Prompt window, maximize it, and execute this command: netstat -an | findstr LISTEN You should see the three listening ports shown below (21, 25, and 80), among others. Capturing a Screen Image Make sure the three listening ports shown above are visible. Capture a whole-desktop image and save it as "Proj 3b". YOU MUST SEND IN A WHOLE-DESKTOP IMAGE FOR FULL CREDIT
  • 5. VM 3: Metasploitable Unzip the metasploitable file you downloaded above and launch the VM. Log in with the default credentials: username and password both msfadmin VirtualBox Instructions If you prefer to use VirtualBox, download this file: Metasploitable2-vbox.7z Size: 692,100,274 SHA-256: 02b128198cb9db2304f0cf45061f186abf326350e6d3dc6da1cebae66027d59d Unzip it to create a Metasploitable2-Linux.vdi file. Then open VirtualBox and click Machine, New. In the "Name and operating system" box, make these entries: Name: Metasploitable2 Type: Linux Version: Ubuntu (32-bit) Click Continue. In the "Memory size" box, accept the default selection and click Continue. In the "Hard disk" box, click the "Use an existing virtual hard disk file" button, click the little folder icon, and navigate to the Metasploitable2-Linux.vdi file. Click Open. Click Create. The new VM appears in the list, and you can start it normally. A text-only console is visible, as shown below.
  • 6. Capturing a Screen Image Make sure the "Linux metasploitable" message is visible, as shown above. Capture a whole-desktop image and save it as "Proj 3c". YOU MUST SEND IN A WHOLE-DESKTOP IMAGE FOR FULL CREDIT Turning in Your Project Email the images to [email protected] with a subject line of "Proj 3 From YOUR NAME", replacing "YOUR NAME" with your real name. Send a Cc to yourself. Last Modified: 8-28-17 5 pm