How To Set up Metasploitable on Windows in Virtual Box

How To Set up Metasploitable on Windows in Virtual Box

Set up Metasploitable on Windows in Virtual Box

 

To get started you will need  Vagrant, Packer, and Virtualbox. Install these dependencies:

 

 

 

We recommend using these exact versions as the scripts were made for them.

Metasploitable on Windows – Install Vagrant reload plugin

Go to the directory in the command line to the directory where unpacked the Vagrant Reload plugin then run this command to install the Vagrant:

vagrant plugin install vagrant-reload

1 Install vagrant-reload

How To Set up Metasploitable on Windows in Virtual Box – 1 Install vagrant-reload

After Vagrant, continue with downloading Packer.

Metasploitable on Windows – Download Packer

The next step is to download Packer from the following download page:

https://www.packer.io/downloads.html

Download the latest version of Packer and unpack it the Metasploitable 3 master directory. Storing the binary of Packer in the direct Metasploitable 3 directory allows easy execution for setup without setting up additional requirements. After you copy the Packer file to the Metasploitable 3 directory, you may set up the virtual machine.

Metasploitable on Windows – Creating the Metasploitable 3 VM

After all of the pre-requisites have been met, you can use Packer to setup the VM in Virtualbox. Move the command line to the Metasploitable 3 location and run the following command from an elevated command line:

packer build windows_2008_r2.json

Build Metasploitable 3 with Packer

How To Set up Metasploitable on Windows in Virtual Box – Build Metasploitable 3 with Packer

Building the VM will take a while so be patient.

Build Metasploitable 3 with Packer finished

Build Metasploitable 3 with Packer – Build Metasploitable 3 once Packer is finished

When the script is finishes run:

vagrant box add windows_2008_r2_virtualbox.box –name=metasploitable3

vagrant box add windows_2008_r2_virtualbox

How To Set up Metasploitable on Windows in Virtual Box – vagrant box add windows_2008_r2_virtualbox

Once that is completely done, run one last command:

vagrant up

The installation of Metasploitable 3 should now be done and you can use the VM.

 

Metasploitable on Windows – Booting Metasploitable 3

Now that you have completed the installation of Metasploitabl you may boot in in Virtualbox. The default username for the virtual machine is “vagrant” with password “vagrant”.

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

Trust No Program, that is Sandboxie’s motto…and we agree when it comes to programs from unknown sources. Which is why we are going to show you how to prevent virus infections with Sandboxie in this tutorial. Best of all, Sandboxie is free and nothing in this tutorial requires anything but a few minutes.

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

 

 

 

 

 

Sandboxie is a very useful security tool that runs on Windows 7 through Windows 10. It is essential to anyone who wants to download files and make sure they aren’t running anything malicious in the background. It is easy to prevent virus infections with Sandboxie with the right knowledge. Some of you may already be testing individual files on Virtual Machines like VMware Workstation or Virtual Box to prevent your host operating system from infection, and with Sandboxie you can do this without the need of a virtual machine that takes up more CPU and RAM than Sandboxie ever could.

So, what is Sandboxie? It is a virtual sandbox environment on your computer than can isolate programs so they cannot make permanent changes to your programs or PC. You can see what is running in the background to make sure the program is not bound with a RAT, Keylogger or other malicious software.

 

How to Use Sandboxie To Prevent Virus Infections with a Virtual Environment

Setting up Sandboxie

  1. Download Sandboxie from their download page and install it. You can find it here: http://www.sandboxie.com/index.php?DownloadSandboxie
  2. Once installed, Open the Sandboxie to configure it. Click on the system tray icon after opening it in your start menu or shortcut to open the control center.

How to Check If a File Is Infected

Step 1: Run a program in Sandboxie. Once you have a file you think is suspicious, you can right click the program and click “Run Sandboxed.”

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

 

 

 

 

Step 2. Choose the default box, wait a few seconds and click the button to continue within Sandboxie.

Step 3. Once you have opened your application in Sandboxie, you will see a yellow border indicating that it is sandboxed. Take a look at your Sandboxie control center to see the programs processes. You will see the default SandboxieRPCSs.exe and SandboxieDcomLaunch.exe and then your program.

How to Check If a File Is Infected

How to Check If a File Is Infected

 

 

 

 

 

 

 

 

 

 

 

 

If the program has a virus bound with it, the virus will show along with the Exe file. So instead of 143VPN.exe showing up alone you would see 143VPN.exe and underneath that another .exe, such as server.exe.

Step 4. Go to View, and select Files and Folders, then expand them. From here you can see if the program starts to make changes to your folders that are unnecessary for a typical program to run, such as messing with system settings. Keep expanding it to see if it drops anything.

Using Sandboxie to Prevent Virus Infections Is Simple Isn’t It?

Yes, it is a very great program to use to test files for infection and to keep them from changing things you don’t want if they happen to be infected. You can use Sandboxie to open a web browser as well to prevent it from leaking viruses from ads and other files onto your computer. Sandboxie is only one of many ways to protect yourself, and this is not a fail-safe or the only method of safety you should take to prevent virus infections. Remember, always to use a Virus Protection program and keep a firewall up as well, and keep safe when it comes to the internet. Don’t trust everything, or as Sandboxie says: Trust No Program

Why You Need a Private VPN Service

Why You Need a Private VPN Service

Do you want privacy from prying eyes online? Perhaps your parents are logging the traffic that goes through the router, or your school is (Which all schools and colleges log data.) Then you will need a Private VPN Service or a Private Virtual Private Network. What does a VPN do anyways? What is it used for?

Well, businesses, schools and any business setting uses a VPN for data encryption. This means they do not want people having access to the data being transmitted from their systems online, so they encrypt it through a VPN; A group of servers that are protected with several layers of security. A VPN will also protect you from your ISP seeing your internet traffic, so it is ideal to use a VPN for torrent or downloading anything your ISP could be interested in, that they really shouldn’t be.

For security we recommend 143VPN. They have servers that are logless, DDoS protected and offer port forwarding. They have locations all over the world. They do not allow torrenting, though. We recommend Torguard, specifically the proxy, for torrenting.

143VPN comes with a user-friendly Windows client for OpenVPN that connects via UDP and TCP. There are also many other options for other Operating Systems such as Mac, Android and iOS.

Securing your internet and being anonymous has never been easier

Use 143VPN to protect your Internet traffic from prying eyes, to protect yourself from DDoS attacks, to stream content worldwide and to unlock access to your favorite sites. Here is what they advertise on their site:

...

Netflix and Movie StreamingHave a small Netflix selection in your country? Connect to 143VPN to get access to various regions so that your Netflix experience is unlimited.

...

Spotify and Music Steaming

  • Bypass Geo-blocks, Access the World
  • Protection From DDoS Attacks
  • Multiple Protocols UDP and TCP
  • World Wide Locations
  • Custom Client
  • Port Forwarding
  • Logless Servers
  • Unblock websites
  • Bypass Censorship

Know your data is encrypted and cannot be seen by your ISP, wifi snoopers or Governments. Keep spying eyes out with 143VPN.

The best torrent VPN we highly recommend is Torguard , here is what they advertise on their website Torguard.net:
  • Unlimited Speeds
  • Unlimited Bandwidth
  • x5 Connections Allowed
  • OpenVPN – PPTP – L2TP
  • StealthVPN – SSTP – IKEv2
  • 1200+ Servers in 42+ Countries
  • FREE 24/7 365 Support encryption
  • Anonymous VPN IP
  • Your IP address is considered your digital fingerprint. Prevent websites from identifying you or your location from your personal IP.
  •  Unblock Any Website
  • Unblock any website regardless of geographical location or firewall. Setup the anonymous VPN software in minutes, on any device.
  •  Stay Private Online
  • Stop snooping governments, ISP’s, hackers and employers from controlling or sniffing your online activities. Don’t let the web browse YOU!
  • Stealth VPN Service
  • TorGuard VPN can tunnel through even the most strict DPI firewalls in countries like China or UAE. Go Stealth with OpenVPN, SSTP & SSH Tunnels.
  • Private VPN Encryption
  • Encryption works. Be discreet when conducting business online with military-grade encryption. Your web history is no one’s business but your own.
  • World Class Support
  • Leave support to the pro’s. TorGuard helpdesk is made of qualified & dedicated individuals. We’re here 24/7 so you can get back to what’s important.

 

You need a Private VPN Service because you want peace of mind. You want to make sure no one is listening to your network, stealing your bank information and logging your data behind your back. If you ever connect to a Public Wifi Hotspot you are very susceptible to this kind of attack, so definitely use a VPN over this kind of internet connection.