By end of the article, we’ll have a VirtualBox image up and running without any problem. This article can be used as a hands-on guide I’ll explain step by step how to set up the virtual machine, the problem I faced, and how I resolved it. The objective of this article is to share my experience with all fellow penetration testers who want to use Metasploitable 2, but are facing the same issue that I did. The first one was a bit easier compared to the second one and this is where I was stuck, as there was no documentation available on how to resolve this problem. So I needed to convert the VMware image to a VirtualBox Image. For some reason, even after trying multiple times, it didn’t work for me. I was unable to use the VMware image and use it as it is.There were two major problems I ran into:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |