2019年05月07日 10:08 阅读量:2829
vpn设置
http://www.maxwithcoco.com/notes/vpn-pptp-in-backtrack-5
apt-get update
apt-get dist-upgrade
apt-get install network-manager-gnome network-manager-pptp
cp /etc/network/interfaces /etc/network/interfaces.bak
nano /etc/network/interfaces
删除文件中除了前两行之后的所有内容:
auto lo
iface lo inet loopback
service network-manager start
System >> Startup Applications >> Network Manager &
重启,
点击桌面右上角配置VPN,记得在Advanced >> Use Point-to-Point encryption (MPPE)
**********************************************************************************
root@bt:~# apt-get update
root@bt:/opt/metasploit# rm -rf msf3
root@bt:/opt/metasploit# rm -rf msf3.zip
#git clone --depth=1 git://github.com/rapid7/metasploit-framework msf3
git clone https://github.com/rapid7/metasploit-framework msf3
修改文件:/opt/metasploit/ruby/lib/ruby/1.9.1/i686-linux/rbconfig.rb
CONFIG["LIBRUBYARG_SHARED"] = "-Wl,-R -Wl,$(libdir) -L$(libdir) "
##CONFIG["LIBRUBYARG_STATIC"] = "-Wl,-R -Wl,$(libdir) -L$(libdir) -l$(RUBY_SO_NAME)-static"
CONFIG["LIBRUBYARG_STATIC"] = "-Wl,-R -Wl,$(libdir) -L$(libdir) "
root@bt:/opt/metasploit/msf3# /opt/metasploit-4.4.0/ruby/bin/bundle install
/opt/metasploit/msf3/msfupdate:143:in `block in run!': Cannot determine checkout type: `/opt/metasploit/msf3' (RuntimeError)
from /opt/metasploit/msf3/msfupdate:135:in `chdir'
from /opt/metasploit/msf3/msfupdate:135:in `run!'
from /opt/metasploit/msf3/msfupdate:292:in `<main>'
curl -LO http://curl.haxx.se/ca/cacert.pem
CURL_CA_BUNDLE=$PWD/cacert.pem
curl -L http://r-7.co/UsEqxW > msfclone.rb
MSFBASE=/opt/metasploit/msf3 ruby msfclone.rb
gem install -user-install typhoeus -v '0.4.2'
gem install -user-install typhoeus
gem install bundler && bundle install --without test development
update-alternatives --config ruby
/etc/init.d/metasploit stop
/var/lib/
sudo apt-get install metasploit --reinstall
sudo apt-get remove metasploit && sudo apt-get autoremove && sudo apt-get autoclean && sudo reboot
/var/lib/dpkg/info/metasploit.postinst
/var/lib/dpkg/info/metasploit.list
/var/lib/dpkg/info/metasploit.preinst
/var/lib/dpkg/info/metasploit.prerm
/usr/share/applications start msfpro
root@bt:~# dpkg -s curl
curl -L get.rvm.io | bash -s stable
vim .bashrc
[[ -s "/usr/local/rvm/scripts/rvm" ]] && source "/usr/local/rvm/scripts/rvm"
PATH=$PATH:/usr/local/rvm/bin
reboot
rvm install 1.9.3-p484
rvm use ruby-1.9.3-p484 --default
rvm use ruby-1.9.3-p545 --default
source /opt/metasploit/scripts/setenv.sh
export MSFPROTOCOL=HTTPS
export GIT=/usr/bin/git
chmod 777 /opt/metasploit/apps/pro/engine/tmp
/usr/local/rvm/rubies/ruby-1.9.3-p545/bin/ruby
mv ~/.rvm/usr/lib ~/.rvm/usr/lib_rvm
git clone --depth=1 git://github.com/rapid7/metasploit-framework msf3