Skip to content

The Pentest VM

Royce Davis edited this page Jun 30, 2020 · 2 revisions

The pentest VM is running Xubuntu version 18.04.4 LTS.

  • Credentials: username pentest password Capsulec0rp

Accessing via SSH

You can access the pentest VM via SSH simply by typing vagrant ssh pentest which will drop you into a terminal for command-line access.

Accessing via RDP

If you want GUI access you can use RDP. You need to pay attention to the port forwarding that vagrant setup when you first provisioned the VM. If you didn't just run vagrant reload pentest and you should see something similar to this.

==> pentest: Forwarding ports...
    pentest: 3389 (guest) => 2208 (host) (adapter 1)
    pentest: 22 (guest) => 2209 (host) (adapter 1)

In this instance vagrant has chosen port 2208 to forward the RDP port from the pentest VM to your localhost. So you can use whatever RDP client you prefer to connect to localhost:2208 and access the GUI.

Metasploit

Metasploit is installed for you already inside the ~/msf directory. As Metasploit can sometimes be finicky about which version of Ruby you're running I've already included RVM which you can use to install different versions of Ruby. However, it is likely you won't need to. See the following

~$ cd msf/
Required ruby-2.6.6 is not installed.
To install do: 'rvm install "ruby-2.6.6"'

./msfconsole

       =[ metasploit v5.0.86-dev-928c23edf3               ]
+ -- --=[ 2004 exploits - 1094 auxiliary - 342 post       ]
+ -- --=[ 562 payloads - 45 encoders - 10 nops            ]
+ -- --=[ 7 evasion                                       ]

Metasploit tip: Enable HTTP request and response logging with set HttpTrace true

msf5 >
Clone this wiki locally