How To Set up Metasploitable on Windows in Virtual Box

How To Set up Metasploitable on Windows in Virtual Box

Set up Metasploitable on Windows in Virtual Box

 

To get started you will need  Vagrant, Packer, and Virtualbox. Install these dependencies:

 

 

 

We recommend using these exact versions as the scripts were made for them.

Metasploitable on Windows – Install Vagrant reload plugin

Go to the directory in the command line to the directory where unpacked the Vagrant Reload plugin then run this command to install the Vagrant:

vagrant plugin install vagrant-reload

1 Install vagrant-reload

How To Set up Metasploitable on Windows in Virtual Box – 1 Install vagrant-reload

After Vagrant, continue with downloading Packer.

Metasploitable on Windows – Download Packer

The next step is to download Packer from the following download page:

https://www.packer.io/downloads.html

Download the latest version of Packer and unpack it the Metasploitable 3 master directory. Storing the binary of Packer in the direct Metasploitable 3 directory allows easy execution for setup without setting up additional requirements. After you copy the Packer file to the Metasploitable 3 directory, you may set up the virtual machine.

Metasploitable on Windows – Creating the Metasploitable 3 VM

After all of the pre-requisites have been met, you can use Packer to setup the VM in Virtualbox. Move the command line to the Metasploitable 3 location and run the following command from an elevated command line:

packer build windows_2008_r2.json

Build Metasploitable 3 with Packer

How To Set up Metasploitable on Windows in Virtual Box – Build Metasploitable 3 with Packer

Building the VM will take a while so be patient.

Build Metasploitable 3 with Packer finished

Build Metasploitable 3 with Packer – Build Metasploitable 3 once Packer is finished

When the script is finishes run:

vagrant box add windows_2008_r2_virtualbox.box –name=metasploitable3

vagrant box add windows_2008_r2_virtualbox

How To Set up Metasploitable on Windows in Virtual Box – vagrant box add windows_2008_r2_virtualbox

Once that is completely done, run one last command:

vagrant up

The installation of Metasploitable 3 should now be done and you can use the VM.

 

Metasploitable on Windows – Booting Metasploitable 3

Now that you have completed the installation of Metasploitabl you may boot in in Virtualbox. The default username for the virtual machine is “vagrant” with password “vagrant”.

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

Trust No Program, that is Sandboxie’s motto…and we agree when it comes to programs from unknown sources. Which is why we are going to show you how to prevent virus infections with Sandboxie in this tutorial. Best of all, Sandboxie is free and nothing in this tutorial requires anything but a few minutes.

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

 

 

 

 

 

Sandboxie is a very useful security tool that runs on Windows 7 through Windows 10. It is essential to anyone who wants to download files and make sure they aren’t running anything malicious in the background. It is easy to prevent virus infections with Sandboxie with the right knowledge. Some of you may already be testing individual files on Virtual Machines like VMware Workstation or Virtual Box to prevent your host operating system from infection, and with Sandboxie you can do this without the need of a virtual machine that takes up more CPU and RAM than Sandboxie ever could.

So, what is Sandboxie? It is a virtual sandbox environment on your computer than can isolate programs so they cannot make permanent changes to your programs or PC. You can see what is running in the background to make sure the program is not bound with a RAT, Keylogger or other malicious software.

 

How to Use Sandboxie To Prevent Virus Infections with a Virtual Environment

Setting up Sandboxie

  1. Download Sandboxie from their download page and install it. You can find it here: http://www.sandboxie.com/index.php?DownloadSandboxie
  2. Once installed, Open the Sandboxie to configure it. Click on the system tray icon after opening it in your start menu or shortcut to open the control center.

How to Check If a File Is Infected

Step 1: Run a program in Sandboxie. Once you have a file you think is suspicious, you can right click the program and click “Run Sandboxed.”

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

Prevent Virus Infections with Sandboxie, The Virtual Environment Without a Virtual Machine

 

 

 

 

Step 2. Choose the default box, wait a few seconds and click the button to continue within Sandboxie.

Step 3. Once you have opened your application in Sandboxie, you will see a yellow border indicating that it is sandboxed. Take a look at your Sandboxie control center to see the programs processes. You will see the default SandboxieRPCSs.exe and SandboxieDcomLaunch.exe and then your program.

How to Check If a File Is Infected

How to Check If a File Is Infected

 

 

 

 

 

 

 

 

 

 

 

 

If the program has a virus bound with it, the virus will show along with the Exe file. So instead of 143VPN.exe showing up alone you would see 143VPN.exe and underneath that another .exe, such as server.exe.

Step 4. Go to View, and select Files and Folders, then expand them. From here you can see if the program starts to make changes to your folders that are unnecessary for a typical program to run, such as messing with system settings. Keep expanding it to see if it drops anything.

Using Sandboxie to Prevent Virus Infections Is Simple Isn’t It?

Yes, it is a very great program to use to test files for infection and to keep them from changing things you don’t want if they happen to be infected. You can use Sandboxie to open a web browser as well to prevent it from leaking viruses from ads and other files onto your computer. Sandboxie is only one of many ways to protect yourself, and this is not a fail-safe or the only method of safety you should take to prevent virus infections. Remember, always to use a Virus Protection program and keep a firewall up as well, and keep safe when it comes to the internet. Don’t trust everything, or as Sandboxie says: Trust No Program