Posted on Leave a comment

Install Parrot OS in Virtualbox

This post shows how to install Parrot OS in Virtualbox. Kali Linux may be the most popular penetration testing distro but if there is any other operating system that can give Kali competition, that would be Parrot Security OS. It also has regular updates just like Kali Linux.

Parrot Security also sports many more tools than Kali Linux which includes software for cryptography, cloud, anonymity, digital forensics and of course programming. One of our readers has requested us to make a guide on how to install Parrot Security OS in Virtualbox.

Recently the latest version of Parrot Security OS (4.9.1) has been release. In this version, they made many changes like upgrading to new linux kernel (5.5), updates to many tools and removal of some redundant launchers.

Just like Kali Linux, the makers of Parrot Security OS are also releasing a OVA format of its OS for virtual machines. This makes installation all the simple without the clutter of virtual box guest additions not working or other related problems. Download the OVA file of Parrot Security OS.

We will install Parrot OS in the recent version of Virtual box. Once the download is successfully finished, open Virtualbox and go to the “File” Menu.

Select the option “Import Appliance”. Alternatively, the import option can also be accessed using command “CTRL+I”. The window opens as shown below.

Load the OVA file as shown in the above image and click on “Next”. The “Appliance settings” menu opens. Make changes as necessary or as you like. Here we have changed the name of the virtual machine and is allocated RAM. After the changes are done, click on “Import”.

In the Popup that comes next, Click on “Agree”.

The importing process starts as shown below. Let it go on without interruption.

After the importing process is done, you will see the virtual machine we just created in the list of virtual machines as shown below.

Start the virtual machine. The virtual machine boots as shown below.

After booting, the login screen opens as shown below. The default credentials are user : toor.

This is how we install Parrot OS in Virtualbox. See how to install Parrot OS in Vmware.

Posted on 8 Comments

Installing Kali Linux in Virtualbox:Simple Method

NOTE : Kali Linux Rolling 2020.4 has been released. This guide works even for that too.

Good evening friends. I have seen that most of the people are still facing many problems while installing Kali Linux in Virtualbox. So today i brought the easiest method to install Kali linux in Virtualbox. It doesn’t involve  typing of any lengthy  commands. For this howto, I am installing Kali Linux v2.0 Sana in virtualbox version 5. This howto works for any host OS, from Windows XP to Windows 10. Just install the latest Virtualbox version for that operating system.

The makers of Kali Linux are providing prebuilt virtualbox images which are available for download here. First download the image.  It would be a compressed image. Now extract the contents of  the file at any location of your choice.

It would be a ova extension file as shown below.

Now open Virtualbox. Go to “File” and choose option “Import appliance”. Click on it.

As soon as you click on it, the below window will open.

Now, browse to the location of the OVA file we just downloaded. Click on “Next”.

You will see the below window.  Check out all the options shown. Change any options if required.

Make sure that the location where you are creating disk has enough space. Click on Import.

The process of importing will start as shown below.

It will take some time to process.  Just wait. As soon as the importing is over you will see the virtual machine  as shown below.

Power On the virtual machine.  After some system processes, you will be asked for the username. The username is “root”.

Next you will be prompted for password. The default password is “toor”.

If everything went well, you should see the interface as shown below. Go to full screen to see if its working. You are all good to go. See, this is the easiest way to install Kali Linux in virtualbox. Hope it was helpful. Please comment if you encounter any problem. I would be happy to solve it.

Posted on 2 Comments

Install Matriux Krypton Ec-centric in Oracle Virtual Box

Matriux Krypton is a pen testing distribution based on Debian. It consists of almost 300 security tools for ethical hacking categorized as arsenals. It has a category for data recovery which is not prevalent in other penetration testing distros. Today we are going to see how to install Matriux Krypton Ec-Centric in Oracle Virtual box. It can be downloaded from here. Open Virtualbox and click on “New virtual machine”. On the popup window, give the name as Matriux ( in fact any name you like ). Select operating system as “Linux” and version as “Ubuntu”. Click on “Next”.

Select the appropriate memory you want to assign to the virtual machine and click on “Next”.

Select the option “create a virtual hard drive file” and click on “Create”.

Select Hard drive file type as VDI. Click on “Next”.

Choose appropriate storage option and click on “Next”.

Set your virtual hard disk size appropriately but I suggest you to keep it above 8 GB. Click on “Create”.

Select the location of the iso file and click on “Start”.

Select the option “Live”  and hit Enter.

Log into account matriux. The default password is  “toor“.

 If everything went well, your system should look like this.

 Before running the Matriux disk Installer, we need to perform some operations. Go to “System>Administration>Gparted” as shown below.

 Enter the administrative password as “toor”. Click on “OK”.

 In the gparted window, click on “Create Partition table”.

 When a warning is shown, click on “Apply”.

 Right click on the unallocated hard disk and select “New” as shown below.

 Change the file system  to ext3 and click on “Add”.

We can see our “New Partition” ready to be created. Click on the “tick mark with blue background”.

 We can see our partition created as below.

 Close the window and click on “Matriux Disk Installer” we saw above. When the window opens as below, click on “Yes”.

 Choose the partition we created( i.e /dev/sda1) and click on “OK”.

Click on “OK”.

Click on “OK”.

Create a personal account login name.

Choose the password for you personal account. Click on “OK”.

Choose the root account password. Click on “OK”.

Select the appropriate locale as en_US. Click on “OK”.

If everything goes well, we will get a window as shown below. Click on “Yes”.

 We will get the below message after successful installation.  Click on “Yes” to reboot your system and you are ready to go.

Hope this was helpful.

Posted on 3 Comments

How to enable DHCP server in VirtualBox

Good evening friends. We have seen how to create a virtual pentest lab both in Oracle VirtualBox (see here) and Vmware Workstation(see here). Although both penetration testing labs  were almost similar, there is a small difference between them . As the title of this howto already implies it is the absence of DHCP server in the pentest lab we created using Virtualbox. VirtualBox provides a DHCP server but it can’t be turned on using the GUI feature unlike Vmware Workstation. So let’s see how to enable DHCP server in Virtualbox networks. I am going to assign DHCP server to my pentest lab I created above. I will assume that  virtualbox is installed on Windows. Open CMD and navigate to the directory where  Virtualbox is installed. By default it will be “C:Program Files OracleVirtualBox”. Type the command “vboxmanage dhcpserver add –ip 10.10.10.1 –netmask 255.0.0.0 –lowerip 10.10.10.2 –upperip 10.10.10.10 –netname pentestlab”. Hit Enter.

In the above command, “vboxmanage dhcpserver  add –ip 10.10.10.1” starts a DHCP server with IP address 10.10.10.1 . The “–netmask 255.0.0.0″ assigns subnet mask for the network. The “–lowerip” and “–upperip” options assign a lower ip address and upper ip address respectively.   The “–enable” option enables the DHCP server we just created. The “–netname” option assigns a name to the network. Now we have successfully created an internal network named pentest lab with its own DHCP server. Now change the network adapter settings of the attacker machine ( Kali Linux ) to pentest lab.

Similarly change the network settings of the victim machine.

Now start the attacker machine (Kali Linux) to see if the IP address is automatically assigned. If the IP address has not been assigned, disable the adapter using command “ifdown eth0″ and re enable it by typing command “ifup eth0″. Now check if the IP address has been assigned or not by typing command “ifconfig”.

Similarly check on the victim machine.

We can see that the IP addresses have been automatically assigned successfully starting from the range of 10.10.10.2. Hope this was helpful.

Posted on 26 Comments

How to create pen testing lab in VirtualBox.

Good evening everybody. Sometime back, I wrote an article on how to set up a virtual penetration testing lab using Vmware Workstation. But Vmware Workstation is a commercial product.

Today I am going to show you how to create a pen test lab in VirtualBox absolutely free of cost. I hope this tutorial will be helpful for many beginners into cyber security domain.

What do we need?

1. Oracle VirtualBox. (Download)

2. Kali Linux. (Download)

3. Metasploitable 2. (Download)

Oracle VirtualBox is the virtualization software we will be using to create our lab. We will be using Kali Linux as the attacker machine and Metasploitable 2 as the victim machine. Install Kali Linux and Metasploitable 2 in VirtualBox.

See how to install Kali Linux in VirtualBox.

See how to install Metasploitable in VirtualBox.

Select Kali Linux, Go to settings > network. Enable “network adapter 1″. Set the “Attached to” option to “internal network”. Set the name of the network adapter to “intnet”. Click on “OK” to save the settings.

Do the same for Metasploitable virtual machine.

Power on the metasploitable VM. Log into the system. Default username and password are “msfadmin”.

Type the command “ifconfig” to see the IP addresses of interfaces.

The ‘lo’ interface is the loopback. Now we are going to set the IP address on the interface “eth0”. Type the command “sudo ifconfig eth0 10.10.10.2 netmask 255.0.0.0 up”. The sudo password is “msfadmin. Verify that the IP address is set by typing command “ifconfig”.

Power on Kali Linux. In the terminal, type command “ifconfig eth0 10.10.10.1 netmask 255.0.0.0 up”. Verify if the IP address is set by typing command “ifconfig”.

Test whether this system can communicate with victim system by pinging the victim machine as shown below.

The connection is successful. Our penetration testing lab is ready. Happy practicing.

Posted on 7 Comments

Installing Metasploitable in VirtualBox

In this howto, you will installing metasploitable in VirtualBox. What is Metasploitable? Learning penetration testing or ethical hacking requires practical knowledge and good practice needs a vulnerable target. That is where Metasploitable comes into picture. It is an intentionally vulnerable operating system made by the makers of Metasploit themselves so that aspiring ethical hackers can practice and hone their hacking skills. As its name conveys Metasploitable is loaded with vulnerabilities that can be exploited with Metasploit modules. 

This virtual machine can be used to conduct security training, test security tools, and practice common penetration testing techniques.  For this i am going to use Metasploitable 2 which can be downloaded from here. After downloading the zip archive, extract the files into a folder. The file contents look like below.

Open VirtualBox and click on “New Virtual machine wizard”. Type the name of your choice. I am using ‘Metasploitable-2‘. Choose ‘Type’ as Linux and ‘version’ as Ubuntu. Click on “Next”.

Choose the memory size appropriate to the availability of RAM on your host machine although 512MB is more than enough. Click on “Next”.

In the hard drive creation window, select option “Use an existing virtual hard drive”, browse to the folder where we have extracted our zip files and select the ‘vmdk’ file available. Click on “Create”.

Then you are automatically booted into the metasploitable OS. The default username and password are “msfadmin”.


With this we successfully finished installing Metasploitable in Virtualbox. See how to create a penetration testing lab.

Posted on 223 Comments

Install Kali in Virtualbox (Update to kali 2020.4)

The makers of Kali Linux have a released the second version (2020.2) of Kali Linux for the year 2020.  Since many versions have been released since we last wrote this article, we decided to update this article on how to install Kali in Virtualbox.

Kali Linux 2020.2 has many brand new features.  With xfce and gnome given Kali Linux feel, this release has given themes for KDE Plasma. This is like going back to its roots as Backtrack used to have this desktop environment. The login screen also has been given new graphics along with a new layout. Also now you can install Powershell by default by selecting the meta package while installing. This release also updated gnome to 3.36. The new tools included in this release include NextNet, the pivot point discovery tool and SpiderFoot  the OSINT tool.

The makers also included python2-pip once again to add support to some tools still depending on python2 although overall it upgraded to Python 3.8. This release also replaces CherryTree, the note taking application with Joplin. Now, let us see the simplest process  to install Kali in Virtualbox. For this download the virtualbox image of Kali Linux 2020.2 from here. We have performed this installation in the Oracle Virtualbox 6.

This howto is using the Kali Linux 32bit OVA . Your downloaded contents should look like below. As you can see, we have an ova file.

Now open Virtualbox and go to File Menu > Import Appliance as shown below. It can also be accessed using shortcut CTRL+ I.

A window like below will open. Browse to the OVA file we downloaded.

After selecting the OVA file, click on “Next”.  If you want to make any changes to the virtual machine settings like RAM, name etc, you can do it here. You can also leave it to default values if you want. Click on “Import”.

Click “Agree” when the software license agreement pops up as shown below. The import process starts.

After the import process is completed, Power On the virtual machine. You will see a login screen prompt. Login using the credentials kali:kali.

Here is the final look of the Kali Linux virtual machine we installed.

Posted on 3 Comments

How to install GNS3 in windows : Step By Step guide

One day, I was intently searching for a method to emulate a router or switch in Oracle VirtualBox  After a long search, I didn’t find a method but I found  another virtualizing software called GNS3.  GNS3 is a network emulation software which can be really helpful to someone preparing for CCNA,CCNP,CCIE,JNCIA,JNCIS and JNCIE. It can emulate  Cisco IOS’s, Junos routers and also  complex networks functioning as close as possible to the real networks without needing the network hardware like routers and switches. The best part of it is that it is open source. However we will have to download Cisco IOS and Junos separately.

GNS3 is available for Windows, Linux and MacOS X. In this article, I am going to show you how to install GNS3 in Windows step by step.

Download the software suitable for your Windows from here. The all-in-one download is recommended.

Click on the executable file downloaded. The welcome message pops up. Click on “Next”.

Then the License Agreement is displayed. Click on “I Agree”.

Then you are asked to choose the start menu folder in which your  program’s shortcuts will be stored. If you choose the default folder, click “Next”. You can also create a new folder if you want.

Then you can choose which components you want to install from the components shown. I suggest you to choose all the options. Click on “Next”.

Then you are asked to choose where you want to install your program. you can choose a different folder if you want but the default folder should be OK. Click on “Install”.

Then the WinPcap installation wizard starts. WinPcap is an opensource library for packet capture and network analysis for Win32 platforms. Click on “Next”.

Click on “Next”.

On the WinPcap License Agreement, click on “I Agree”.

On the review WinPcap installation options, Click on “Install”.

The installation starts.

After the installation is finished, Click on “Finish”.

Then the  Wireshark installation wizard” opens (only if you selected the component for installation above). Wireshark is a network sniffer. Click on “Next”.

You are shown the License Agreement of Wireshark. Click on “I Agree”.

Then you are prompted to select the components of Wireshark you want to install. Choose all and Click on “Next”.

Then you are prompted to select which shortcuts you want to create. The choice is yours. Click on “Next”.

Then choose the directory in which you want to install Wireshark and click on “Next”.

Then Wireshark starts installing.

After the installation is completed, Click on “Next”.

Then Completion of Wireshark installation Wizard appears. You are prompted to choose if you want to run Wireshark. Don’t make any selection. Click on “Finish”.

Then the installation of GNS3 starts.

After the installation is completed, click on “Next”.

Completion of GNS3 wizard appears. Click on “Finish”.

Start GNS3. The following window appears when we start GNS3 for the first time. Click on 1(the space enclosed in a red box).

This is to check whether path to Dynamips and the path to its working directory are valid or not. Dynamips is the core program that allows IOS simulation. Click “OK”.

Let’s go to Step 2. Here we configure path to our IOS image directory. We have to store all our images in this directory. Make changes to the path if you want otherwise click on “OK”.

Step 3: In this step, we will add one or more uncompressed IOS images of a router or switch. As already said, IOS images should be downloaded separately due to license agreements.

Browse to the folder where your IOS image is. I am adding a CISCO c3700 router for example. Click on Save and your window should like this.

Click on “Close” and your GNS3  windows appears.

In the Node Types section, click on C700 (the type we just added)  and drag it to the right to see if our router has been added or not. If it is like below, then your installation is success. Happy practicing.