ComputerSecurityStudent (CSS) [Login] [Join Now]




|SECURITY TOOLS >> Metasploit >> Current Page |Views: 20511

(Metasploit: Getting Started on Backtrack 4)

{ Configure IP Address, Starting MSF Console }


1. Logging into Backtrack01
  1. Login to your Backtrack01 VM, as username root

     

  2. startx
    • Issue the startx command if you are currently are only seeing a console and not a graphical user interface.

 

2. Confirm Backtrack01 has an IP Address
  1. Fire up a console or terminal window
    • System --> Konsole

     

  2. ifconfig
    • Example:  No IP Address for eth0
      • If a valid IP address for eth0 is not displayed please move onto step 3.

       

    • Example: Valid IP Address for eth0

       

  3. vi /etc/network/interfaces

     

  4. Your file should look similar to the below screen shot

     

  5. cd /etc/init.d/

     

  6. ./networking start

     

  7. Confirm you have a valid IP address for eth0
    • In my case, eth0's IP address is 192.168.1.107.

 

3. Stop Firewall on Backtrack01
  1. Start Firestarter
    • System --> Firestarter

     

  2. Click on Stop Firewall

 

5. Starting up the Metasploit MSF Console
  1. Fire up the MSF Console (See Below)
    • Note It might take a while to start.

     

  2. Once MSF Loads (See Below)
 


Help ComputerSecurityStudent
pay for continued research,
resources & bandwidth