LXF 154 BackTrack - on Ubuntu 11.10 64

Comments, suggestions and questions about Linux Format magazine and the coverdiscs

Moderators: ChrisThornett, LXF moderators

LXF 154 BackTrack - on Ubuntu 11.10 64

Postby repager » Mon Feb 13, 2012 10:08 pm

The process described in 'Learn to Hack' fails at hosts>Nmap Scan>Intense Scan in that only 3 hosts are found not 4 and that
seems a game breaker?
repager
 
Posts: 8
Joined: Fri Jun 30, 2006 10:29 am

Postby Ben » Tue Feb 14, 2012 2:48 pm

Hi Repager,

The four machines found should relate to the host machine, the DHCP server, the metasploitable server and the backtrack attacker. In order to know what the problem is, we need to find out which is missing.

Can you let me know the IP addresses of the machines it finds?

The next place I'd check is the networking setup in virtualbox. first, make sure all the machines are connected to a 'host only adapter' rather than any other of the networking methods, and then check the network setup in virtualbox. Go to file > preferences > network. There should be at least one network listed there (if there's more than one then make sure all the virtual machines you've created are attached to the same one) then click on the screw driver and post the settings in the dialog.

Let me know the info from here and I'll see if I can work out what the problem is.

thanks,

Ben
Ben
 
Posts: 25
Joined: Wed Feb 01, 2012 11:42 am

Postby repager » Tue Feb 14, 2012 4:59 pm

Ben, thanks for the reply the IPs are
192.168.56.1 and 100 and 101
Both are connected to 'host only adapter' but as instructed Backtrack is also connected to NAT
Only one network 192.168.56.
adapter .01 server .100 netmask as expected 255.255.255.0

This is a clean install of virtualbox - I completely removed the previous version where I saw the same problem - I am using v5 of Backtrack there is 5R1 - ould that be the issue?
repager
 
Posts: 8
Joined: Fri Jun 30, 2006 10:29 am

Postby nelz » Tue Feb 14, 2012 6:33 pm

5R1 is on the cover disc, so it's easy enough to check.
"Insanity: doing the same thing over and over again and expecting different results." (Albert Einstein)
User avatar
nelz
Site admin
 
Posts: 8552
Joined: Mon Apr 04, 2005 11:52 am
Location: Warrington, UK

Postby repager » Tue Feb 14, 2012 8:57 pm

Well, I wanted 64 so I downloaded - same result
repager
 
Posts: 8
Joined: Fri Jun 30, 2006 10:29 am

Postby Ben » Wed Feb 15, 2012 9:42 am

Hi,

Can you run ifconfig on the backtrack machine. This will output a block of test for each network interface. The one I'm interested in is vboxnet0. part of this should be inet addr: this will give you the IP of the attacker. If this is 192.168.56.101 then the missing machine is the metasploitable server, if not then the backtrack machine hasn't been picked up.

If it's the backtrack machine missing then there's probably something in the setup of that version that stops it being picked up by nmap. This shouldn't stop the attack working so just keep following the tutorial.

If it's the metasploitable server that's not got an IP address then there's probably something gone wrong when it boots up. Double check that the Enable PAE/NX box is checked (step six in the step-by-step guide), if it is then take a look at the window for the metasploitable virtual machine and let me know what it says.

Thanks,

Ben
Ben
 
Posts: 25
Joined: Wed Feb 01, 2012 11:42 am

Postby gdawg » Thu Feb 16, 2012 1:48 am

Hi, I also had a problem with only 3 hosts showing but when I ran it today it showed 4 hosts and the Metasploitable one is 192.168.56.102. I got all the way to finding the one key file: 57c3115d..... However the key file I found was one digit different than the one printed in magazine: 57c3115d77c5639o332dc5c49978627a-5429.pub vs 57c3115d77c56390332dc5c49978627a-5429.pub ...c5639o in mag. ...c56390 in terminal. I tried both in ssh command and neither worked. It said "Could not resolve hostname 57c...: Name or service not known". I tried running it in root directory and in ~/rsa/2048 directory with same results. Any help will be appreciated.
gdawg
 
Posts: 14
Joined: Fri Nov 18, 2011 2:55 pm
Location: New Mexico, USA

Postby Ben » Thu Feb 16, 2012 9:34 am

Hi Gdawg

I've just had a look and there's an errant space in the command in the magazine. The SSH command should be:

ssh -i ~/rsa/2048/57c3115d77c56390332dc5c49978627a-5429 root@192.168.56.102

rather than

ssh -i ~/rsa/2048/ 57c3115d77c56390332dc5c49978627a-5429 root@192.168.56.102

This should explain the error you got.

Ben
Ben
 
Posts: 25
Joined: Wed Feb 01, 2012 11:42 am

Postby gdawg » Thu Feb 16, 2012 6:11 pm

Thanks for the info Ben. It worked great. I forgot to point-out that when I was only seeing 3 hosts, I was enabling 2 Metasploitable Network adapters (which is how I interpreted instruction #6 in magazine). When I only enabled Network Adapter #1, I saw 4 hosts. Maybe this will help someone who is struggling with same problem.
gdawg
 
Posts: 14
Joined: Fri Nov 18, 2011 2:55 pm
Location: New Mexico, USA

Postby repager » Thu Feb 16, 2012 9:58 pm

Ben, I was doing the same as gdawg on the Metasploitable adapters changing to one 'host only' and I have 4 hosts.
Thanks all for the help.
repager
 
Posts: 8
Joined: Fri Jun 30, 2006 10:29 am


Return to Magazine and coverdiscs

Who is online

Users browsing this forum: No registered users and 1 guest