ComputerSecurityStudent (CSS) [Login] [Join Now]

|SECURITY TOOLS >> Metasploit >> Current Page |Views: 20041

(Metasploit: Getting Started on Backtrack 4)

{ Configure IP Address, Starting MSF Console }

1. Logging into Backtrack01
  1. Login to your Backtrack01 VM, as username root


  2. startx
    • Issue the startx command if you are currently are only seeing a console and not a graphical user interface.


2. Confirm Backtrack01 has an IP Address
  1. Fire up a console or terminal window
    • System --> Konsole


  2. ifconfig
    • Example:  No IP Address for eth0
      • If a valid IP address for eth0 is not displayed please move onto step 3.


    • Example: Valid IP Address for eth0


  3. vi /etc/network/interfaces


  4. Your file should look similar to the below screen shot


  5. cd /etc/init.d/


  6. ./networking start


  7. Confirm you have a valid IP address for eth0
    • In my case, eth0's IP address is


3. Stop Firewall on Backtrack01
  1. Start Firestarter
    • System --> Firestarter


  2. Click on Stop Firewall


5. Starting up the Metasploit MSF Console
  1. Fire up the MSF Console (See Below)
    • Note It might take a while to start.


  2. Once MSF Loads (See Below)

Help ComputerSecurityStudent
pay for continued research,
resources & bandwidth