Results 1 to 3 of 3

Thread: windows 7 host, 1 vm attacker, 1 vm victim questions

  1. #1
    Just burned his ISO
    Join Date
    Jan 2011
    Posts
    1

    Default windows 7 host, 1 vm attacker, 1 vm victim questions

    hey guys, just wondering a few things. if i use my main win7 machine as my host machine and 2 vm's using 1 as the attacker and 1 as the victim machine and using all 3 as bridged connections (to get different ip addresses for all three), will metaploit work using this method ? also, if i run a exploit on a vm, can my host machine (windows7) be exploited as well ? thanks for help

  2. #2
    Good friend of the forums gunrunr's Avatar
    Join Date
    Jan 2010
    Location
    shining my spoon
    Posts
    265

    Default Re: windows 7 host, 1 vm attacker, 1 vm victim questions

    if you are doing these types of these things in workstation its probably easier to use nat instead of bridged mode because vmware has a virtual router that assigns addresses to vms. bridged mode is nice if you just want to use you ethernet connection you have with the host for your vm's as well.
    Wielder of the spoon of doom
    Summercon, Toorcon, Defcon, Bsides, Derbycon, Shmoocon oh my
    Come hang out with hackers on twitter @gunrunr556

  3. #3
    Senior Member iproute's Avatar
    Join Date
    Jan 2010
    Location
    Midwest, USA
    Posts
    192

    Default Re: windows 7 host, 1 vm attacker, 1 vm victim questions

    It can work for alot of simulation, but when you get to things to ARP poisoning in this type of situation, I've noticed strange things can happen. Other attacks can work fine. Metasploit should work fine most of the time. Your host can also be exploited this way, if you so choose.

Similar Threads

  1. RAW Sockets questions host OS running BT Guest
    By dmshady001 in forum Beginners Forum
    Replies: 2
    Last Post: 07-18-2010, 01:05 PM
  2. Installing BackTrack 4 On Virtual Box With Windows Host.
    By purehate in forum OLD BT4 Videos
    Replies: 0
    Last Post: 10-02-2009, 12:01 AM
  3. 'Attacker controlled honeypot' Scenario
    By loop4me in forum OLD Pentesting
    Replies: 8
    Last Post: 09-06-2009, 03:19 PM
  4. change what the victim sees
    By cain#1 in forum OLD Newbie Area
    Replies: 2
    Last Post: 07-10-2009, 06:05 PM
  5. Windows 7, any questions?
    By Talkie Toaster in forum OLD General IT Discussion
    Replies: 6
    Last Post: 01-20-2009, 03:42 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •