-
Notifications
You must be signed in to change notification settings - Fork 158
The Pentest VM
The pentest VM is running Xubuntu version 18.04.4 LTS.
- Credentials: username
pentest
passwordCapsulec0rp
You can access the pentest VM via SSH simply by typing vagrant ssh pentest
which will drop you into a terminal for command-line access.
If you want GUI access you can use RDP. You need to pay attention to the port forwarding that vagrant setup when you first provisioned the VM. If you didn't just run vagrant reload pentest
and you should see something similar to this.
==> pentest: Forwarding ports...
pentest: 3389 (guest) => 2208 (host) (adapter 1)
pentest: 22 (guest) => 2209 (host) (adapter 1)
In this instance vagrant has chosen port 2208 to forward the RDP port from the pentest VM to your localhost. So you can use whatever RDP client you prefer to connect to localhost:2208
and access the GUI.
Metasploit is installed for you already inside the ~/msf
directory. As Metasploit can sometimes be finicky about which version of Ruby you're running I've already included RVM which you can use to install different versions of Ruby. However, it is likely you won't need to. See the following
~$ cd msf/
Required ruby-2.6.6 is not installed.
To install do: 'rvm install "ruby-2.6.6"'
./msfconsole
=[ metasploit v5.0.86-dev-928c23edf3 ]
+ -- --=[ 2004 exploits - 1094 auxiliary - 342 post ]
+ -- --=[ 562 payloads - 45 encoders - 10 nops ]
+ -- --=[ 7 evasion ]
Metasploit tip: Enable HTTP request and response logging with set HttpTrace true
msf5 >