Access Metasploit through PuTTY
10:18 am
backtrack
0
comments
Access Metasploit through PuTTY
While using the a number of virtual machines simultaneously, there is memory shortage in Windows machine, therefore we have to adopt some technique to avoid this situation.
Solution to this problem is to use PuTTY as it is one of the most popular and free SSH client for Windows.We can easily connect the session with the Back|Track machine using PuTTY.
STEPS:
1- We will start our BackTrack virtual machine.Login to the command line and execute any
one of the following commands to start secure shell.
root@bt:~# /etc/init.d/start ssh
root@bt:~# start ssh
This starts the SSH process on the BackTrack machine. Find the IP address of the machine by entering the following command:
root@bt:~# ifconfig
Note down this IP address on your notepad :-)
2- Now start PuTTY on the host operating system. Enter the IP address(Host Name) of the Back|Track virtual machine and enter port 22.
Now click on Open to launch the command line. If the connection is successful, you will see the PuTTY command line functioning on behalf of the BackTrack machine. It will ask you to log in. Enter the credentials and enter ifconfig to check if the IP is the same as that of the virtual BackTrack.
BENEFITS:
In SSH session we can interact with the BackTrack virtual machine using PuTTY. As the GUI of Back|Track is not loaded, it reduces the memory consumption by almost half. Also minimizing the BackTrack virtual machine will further reduce memory consumption as the Windows operating system provides less memory share to the processes that are minimized and provides faster execution of tasks.
0 comments: