Posted on Leave a comment

Install Parrot OS in Virtualbox

This post shows how to install Parrot OS in Virtualbox. Kali Linux may be the most popular penetration testing distro but if there is any other operating system that can give Kali competition, that would be Parrot Security OS. It also has regular updates just like Kali Linux.

Parrot Security also sports many more tools than Kali Linux which includes software for cryptography, cloud, anonymity, digital forensics and of course programming. One of our readers has requested us to make a guide on how to install Parrot Security OS in Virtualbox.

Recently the latest version of Parrot Security OS (4.9.1) has been release. In this version, they made many changes like upgrading to new linux kernel (5.5), updates to many tools and removal of some redundant launchers.

Just like Kali Linux, the makers of Parrot Security OS are also releasing a OVA format of its OS for virtual machines. This makes installation all the simple without the clutter of virtual box guest additions not working or other related problems. Download the OVA file of Parrot Security OS.

We will install Parrot OS in the recent version of Virtual box. Once the download is successfully finished, open Virtualbox and go to the “File” Menu.

Select the option “Import Appliance”. Alternatively, the import option can also be accessed using command “CTRL+I”. The window opens as shown below.

Load the OVA file as shown in the above image and click on “Next”. The “Appliance settings” menu opens. Make changes as necessary or as you like. Here we have changed the name of the virtual machine and is allocated RAM. After the changes are done, click on “Import”.

In the Popup that comes next, Click on “Agree”.

The importing process starts as shown below. Let it go on without interruption.

After the importing process is done, you will see the virtual machine we just created in the list of virtual machines as shown below.

Start the virtual machine. The virtual machine boots as shown below.

After booting, the login screen opens as shown below. The default credentials are user : toor.

This is how we install Parrot OS in Virtualbox. See how to install Parrot OS in Vmware.

Liked this article? Learn advanced ethical hacking tutorials in our Monthly Magazine. Enjoy Free for 3 months.

Posted on 2 Comments

Install Matriux Krypton Ec-centric in Oracle Virtual Box

Matriux Krypton is a pen testing distribution based on Debian. It consists of almost 300 security tools for ethical hacking categorized as arsenals. It has a category for data recovery which is not prevalent in other penetration testing distros. Today we are going to see how to install Matriux Krypton Ec-Centric in Oracle Virtual box. It can be downloaded from here. Open Virtualbox and click on “New virtual machine”. On the popup window, give the name as Matriux ( in fact any name you like ). Select operating system as “Linux” and version as “Ubuntu”. Click on “Next”.

Select the appropriate memory you want to assign to the virtual machine and click on “Next”.

Select the option “create a virtual hard drive file” and click on “Create”.

Select Hard drive file type as VDI. Click on “Next”.

Choose appropriate storage option and click on “Next”.

Set your virtual hard disk size appropriately but I suggest you to keep it above 8 GB. Click on “Create”.

Select the location of the iso file and click on “Start”.

Select the option “Live”  and hit Enter.

Log into account matriux. The default password is  “toor“.

 If everything went well, your system should look like this.

 Before running the Matriux disk Installer, we need to perform some operations. Go to “System>Administration>Gparted” as shown below.

 Enter the administrative password as “toor”. Click on “OK”.

 In the gparted window, click on “Create Partition table”.

 When a warning is shown, click on “Apply”.

 Right click on the unallocated hard disk and select “New” as shown below.

 Change the file system  to ext3 and click on “Add”.

We can see our “New Partition” ready to be created. Click on the “tick mark with blue background”.

 We can see our partition created as below.

 Close the window and click on “Matriux Disk Installer” we saw above. When the window opens as below, click on “Yes”.

 Choose the partition we created( i.e /dev/sda1) and click on “OK”.

Click on “OK”.

Click on “OK”.

Create a personal account login name.

Choose the password for you personal account. Click on “OK”.

Choose the root account password. Click on “OK”.

Select the appropriate locale as en_US. Click on “OK”.

If everything goes well, we will get a window as shown below. Click on “Yes”.

 We will get the below message after successful installation.  Click on “Yes” to reboot your system and you are ready to go.

Hope this was helpful.

Posted on 3 Comments

How to enable DHCP server in VirtualBox

Good evening friends. We have seen how to create a virtual pentest lab both in Oracle VirtualBox (see here) and Vmware Workstation(see here). Although both penetration testing labs  were almost similar, there is a small difference between them . As the title of this howto already implies it is the absence of DHCP server in the pentest lab we created using Virtualbox. VirtualBox provides a DHCP server but it can’t be turned on using the GUI feature unlike Vmware Workstation. So let’s see how to enable DHCP server in Virtualbox networks. I am going to assign DHCP server to my pentest lab I created above. I will assume that  virtualbox is installed on Windows. Open CMD and navigate to the directory where  Virtualbox is installed. By default it will be “C:Program Files OracleVirtualBox”. Type the command “vboxmanage dhcpserver add –ip –netmask –lowerip –upperip –netname pentestlab”. Hit Enter.

In the above command, “vboxmanage dhcpserver  add –ip” starts a DHCP server with IP address . The “–netmask″ assigns subnet mask for the network. The “–lowerip” and “–upperip” options assign a lower ip address and upper ip address respectively.   The “–enable” option enables the DHCP server we just created. The “–netname” option assigns a name to the network. Now we have successfully created an internal network named pentest lab with its own DHCP server. Now change the network adapter settings of the attacker machine ( Kali Linux ) to pentest lab.

Similarly change the network settings of the victim machine.

Now start the attacker machine (Kali Linux) to see if the IP address is automatically assigned. If the IP address has not been assigned, disable the adapter using command “ifdown eth0″ and re enable it by typing command “ifup eth0″. Now check if the IP address has been assigned or not by typing command “ifconfig”.

Similarly check on the victim machine.

We can see that the IP addresses have been automatically assigned successfully starting from the range of Hope this was helpful.

Posted on 27 Comments

Create Virtual pentesting Lab in VirtualBox

Hello aspiring hackers. In this howto you will see how to create virtual pentesting lab in Virtualbox.  Sometime back, I wrote an article on how to set up a virtual penetration testing lab using Vmware Workstation. But Vmware Workstation is a commercial product.

Today I am going to show you how to create a pen test lab in VirtualBox absolutely free of cost. I hope this tutorial will be helpful for many beginners into cyber security domain.

What do we need?

1. Oracle VirtualBox. (Download)

2. Kali Linux. (Download)

3. Metasploitable 2. (Download)

Oracle VirtualBox is the virtualization software we will be using to create our lab. We will be using Kali Linux as the attacker machine and Metasploitable 2 as the victim machine. Install Kali Linux and Metasploitable 2 in VirtualBox.

See how to install Kali Linux in VirtualBox.

See how to install Metasploitable in VirtualBox.

Select Kali Linux, Go to settings > network. Enable “network adapter 1″. Set the “Attached to” option to “internal network”. Set the name of the network adapter to “intnet”. Click on “OK” to save the settings.

Do the same for Metasploitable virtual machine.

Power on the metasploitable VM. Log into the system. Default username and password are “msfadmin”.

Type the command “ifconfig” to see the IP addresses of interfaces.

The ‘lo’ interface is the loopback. Now we are going to set the IP address on the interface “eth0”. Type the command “sudo ifconfig eth0 netmask up”. The sudo password is “msfadmin. Verify that the IP address is set by typing command “ifconfig”.

Power on Kali Linux. In the terminal, type command “ifconfig eth0 netmask up”. Verify if the IP address is set by typing command “ifconfig”.

Test whether this system can communicate with victim system by pinging the victim machine as shown below.

The connection is successful. Our virtual pentesting lab is ready. Happy practicing.

Posted on 8 Comments

Installing Metasploitable in VirtualBox

In this howto, you will installing metasploitable in VirtualBox. What is Metasploitable? Learning penetration testing or ethical hacking requires practical knowledge and good practice needs a vulnerable target. That is where Metasploitable comes into picture. It is an intentionally vulnerable operating system made by the makers of Metasploit themselves so that aspiring ethical hackers can practice and hone their hacking skills. As its name conveys Metasploitable is loaded with vulnerabilities that can be exploited with Metasploit modules. 

This virtual machine can be used to conduct security training, test security tools, and practice common penetration testing techniques.  For this i am going to use Metasploitable 2 which can be downloaded from here. After downloading the zip archive, extract the files into a folder. The file contents look like below.

Open VirtualBox and click on “New Virtual machine wizard”. Type the name of your choice. I am using ‘Metasploitable-2‘. Choose ‘Type’ as Linux and ‘version’ as Ubuntu. Click on “Next”.

Choose the memory size appropriate to the availability of RAM on your host machine although 512MB is more than enough. Click on “Next”.

In the hard drive creation window, select option “Use an existing virtual hard drive”, browse to the folder where we have extracted our zip files and select the ‘vmdk’ file available. Click on “Create”.

Then you are automatically booted into the metasploitable OS. The default username and password are “msfadmin”.

With this we successfully finished installing Metasploitable in Virtualbox. See how to create a penetration testing lab.