Once hard disk is selected, our screen should look as follows. Here – we’ll point the VirtualBox image to our converted hard diskĭ. Choose the hard disk by locating the same from local machine. You can modify this if you want I went with the default settings.Ĭ. Enter a name of your choice – I’ve keyed in “exploitable.”ī. Open VirtualBox and Click on Add to create a new Virtual Machine and follow the screenshots in the following order:a. Now that we have the VirtualBox image ready, let’s create a new virtual machine and see if this works. All we need to do is create a new virtual machine and fire it up.Ī. Once the above command completes, we have a VirtualBox compatible hard disk ready no. The above command will do the conversion – which can be seen in following screenshot: One can use the following command for image conversion: VBoxManage clonehd Metasploitable.vmdk Metasploitable2-Linux.vdi -format VDI*.vmdk files are VMware extensions and VDI is the extension for VirtualBox.
This step was not very difficult and just by doing a little bit of Googling, I was able to find out how to convert the VMware image to VirtualBox.
I normally use an ISO file and load it up in VirtualBox. The first step for me was to convert the VMware image to the VirtualBox image. We’ll also troubleshoot the problems as we face them. The following section will explain each of the steps in detail. This article will only focus on getting the vulnerable machine up and running in an already existing VirtualBox installation. It is left as an exercise for the end user. We will not cover the installation aspects of VirtualBox, either. What won’t we cover?Ī detailed description of VirtualBox, VM ware or Metasploitable is out of the scope of this article. By end of the article, we’ll have a VirtualBox image up and running without any problem. This article can be used as a hands-on guide I’ll explain step by step how to set up the virtual machine, the problem I faced, and how I resolved it.
The objective of this article is to share my experience with all fellow penetration testers who want to use Metasploitable 2, but are facing the same issue that I did. The first one was a bit easier compared to the second one and this is where I was stuck, as there was no documentation available on how to resolve this problem. So I needed to convert the VMware image to a VirtualBox Image. For some reason, even after trying multiple times, it didn’t work for me. I was unable to use the VMware image and use it as it is.
There were two major problems I ran into: