he reinstalado y vuelve a ser vulnerable.
gracias a tod@s
gracias a tod@s
Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.
Mostrar Mensajes Menú[*] Started reverse TCP handler on 192.168.56.4:4444
[*] 192.168.56.3:445 - Target OS: Windows 7 Ultimate 7600
[-] 192.168.56.3:445 - Unable to find accessible named pipe!
[*] Exploit completed, but no session was created.
msf5 auxiliary(scanner/smb/smb_ms17_010) > set rhost 192.168.56.3
rhost => 192.168.56.3
msf5 auxiliary(scanner/smb/smb_ms17_010) > set THREADS 11
THREADS => 11
msf5 auxiliary(scanner/smb/smb_ms17_010) > run
[+] 192.168.56.3:445 - Host is likely VULNERABLE to MS17-010! - Windows 7 Ultimate 7600 x86 (32-bit)
[*] 192.168.56.3:445 - Scanned 1 of 1 hosts (100% complete)
msf > reload_all
[*] Reloading modules from all module paths...
[-] Error while running command reload_all: bignum too big to convert into `long'
Call stack:
/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `not_after='
/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `sign_jar'
/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:123:in `generate_jar'
/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:38:in `generate'
/usr/share/metasploit-framework/lib/msf/core/payload.rb:204:in `size'
/usr/share/metasploit-framework/lib/msf/core/payload_set.rb:158:in `block (2 levels) in recalculate'
/usr/share/metasploit-framework/lib/msf/core/payload_set.rb:102:in `each_pair'
/usr/share/metasploit-framework/lib/msf/core/payload_set.rb:102:in `block in recalculate'
/usr/share/metasploit-framework/lib/msf/core/payload_set.rb:98:in `each_pair'
/usr/share/metasploit-framework/lib/msf/core/payload_set.rb:98:in `recalculate'
/usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:251:in `block in load_modules'
/usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `each'
/usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `load_modules'
/usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:119:in `block in load_modules'
/usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `each'
/usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `load_modules'
/usr/share/metasploit-framework/lib/msf/core/module_manager/reloading.rb:34:in `block in reload_modules'
/usr/share/metasploit-framework/lib/msf/core/module_manager/reloading.rb:33:in `each'
/usr/share/metasploit-framework/lib/msf/core/module_manager/reloading.rb:33:in `reload_modules'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/modules.rb:802:in `cmd_reload_all'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:548:in `run_command'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:510:in `block in run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:504:in `each'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:504:in `run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:206:in `run'
/usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
/usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
/usr/bin/msfconsole:48:in `<main>'
msf >
─[USER@parrot]─[~]
└──╼ $service postgresql start
┌─[USER@parrot]─[~]
└──╼ $sudo msfconsole
[sudo] password for USER:
[-] WARNING! The following modules could not be loaded!
[-] : Errno::ENOENT No such file or directory
+-------------------------------------------------------+
| METASPLOIT by Rapid7 |
+---------------------------+---------------------------+
=[ metasploit v4.16.34-dev ]
+ -- --=[ 1731 exploits - 990 auxiliary - 300 post ]
+ -- --=[ 509 payloads - 40 encoders - 10 nops ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
─[user@parrot]─[~]
└──╼ $sudo su
┌─[root@parrot]─[/home/user]
└──╼ #msfdb reinit
Creating database user 'msf'
Ingrese la contraseña para el nuevo rol:
Ingrésela nuevamente:
Creating databases 'msf' and 'msf_test'
Creating configuration file in /usr/share/metasploit-framework/config/database.yml
Creating initial database schema
┌─[root@parrot]─[/home/user]
└──╼ #msfconsole
[-] WARNING! The following modules could not be loaded!
[-] : Errno::ENOENT No such file or directory
+-------------------------------------------------------+
| METASPLOIT by Rapid7 |
+---------------------------+---------------------------+
=[ metasploit v4.16.34-dev ]
+ -- --=[ 1731 exploits - 990 auxiliary - 300 post ]
+ -- --=[ 509 payloads - 40 encoders - 10 nops ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
msf > reload_all
[*] Reloading modules from all module paths...
[-] Error while running command reload_all: bignum too big to convert into `long'
Call stack:
/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `not_after='
/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `sign_jar'
/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:123:in `generate_jar'
/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:38:in `generate'
/usr/share/metasploit-framework/lib/msf/core/payload.rb:204:in `size'
/usr/share/metasploit-framework/lib/msf/core/payload_set.rb:158:in `block (2 levels) in recalculate'
/usr/share/metasploit-framework/lib/msf/core/payload_set.rb:102:in `each_pair'
/usr/share/metasploit-framework/lib/msf/core/payload_set.rb:102:in `block in recalculate'
/usr/share/metasploit-framework/lib/msf/core/payload_set.rb:98:in `each_pair'
/usr/share/metasploit-framework/lib/msf/core/payload_set.rb:98:in `recalculate'
/usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:251:in `block in load_modules'
/usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `each'
/usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `load_modules'
/usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:119:in `block in load_modules'
/usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `each'
/usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `load_modules'
/usr/share/metasploit-framework/lib/msf/core/module_manager/reloading.rb:34:in `block in reload_modules'
/usr/share/metasploit-framework/lib/msf/core/module_manager/reloading.rb:33:in `each'
/usr/share/metasploit-framework/lib/msf/core/module_manager/reloading.rb:33:in `reload_modules'
/usr/share/metasploit-framework/lib/msf/ui/console/command_dispatcher/modules.rb:802:in `cmd_reload_all'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:548:in `run_command'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:510:in `block in run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:504:in `each'
/usr/share/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:504:in `run_single'
/usr/share/metasploit-framework/lib/rex/ui/text/shell.rb:206:in `run'
/usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
/usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
/usr/bin/msfconsole:48:in `<main>'
msf >
msfupdate
msfupdate is no longer supported when Metasploit is part of the operating
system. Please use 'apt update; apt install metasploit-framework'
apt update
Obj:1 http://deb.parrotsec.org/parrot stable InRelease
Obj:2 http://archive.parrotsec.org/parrot stable InRelease
Leyendo lista de paquetes... Hecho
Creando árbol de dependencias
Leyendo la información de estado... Hecho
Se puede actualizar 1 paquete. Ejecute «apt list --upgradable» para verlo.
┌─[root@parrot]─[/home/user]
└──╼ #apt install metasploit-framework
Leyendo lista de paquetes... Hecho
Creando árbol de dependencias
Leyendo la información de estado... Hecho
metasploit-framework ya está en su versión más reciente (4.16.34-1parrot1).
fijado metasploit-framework como instalado manualmente.
0 actualizados, 0 nuevos se instalarán, 0 para eliminar y 1 no actualizados.
┌─[✗]─[root@parrot]─[/home/user]
└──╼ #servicer postgresql start
bash: servicer: no se encontró la orden
┌─[✗]─[root@parrot]─[/home/user]
└──╼ #service postgresql start
┌─[root@parrot]─[/home/user]
└──╼ #msfconsole
[-] WARNING! The following modules could not be loaded!
[-] : Errno::ENOENT No such file or directory
=[ metasploit v4.16.34-dev ]
+ -- --=[ 1731 exploits - 990 auxiliary - 300 post ]
+ -- --=[ 509 payloads - 40 encoders - 10 nops ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
─[user@parrot]─[~]
└──╼ $service postgresql start
┌─[user@parrot]─[~]
└──╼ $msfconsole-start
ERROR: /usr/bin/msfdb: must be run as root
ERROR: /usr/bin/msfdb: must be run as root
[*] Initializing msfd...
[*] Running msfd...
/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `not_after=': bignum too big to convert into `long' (RangeError)
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `sign_jar'
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:123:in `generate_jar'
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:38:in `generate'
from /usr/share/metasploit-framework/lib/msf/core/payload.rb:204:in `size'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:158:in `block (2 levels) in recalculate'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:102:in `each_pair'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:102:in `block in recalculate'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:98:in `each_pair'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:98:in `recalculate'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:251:in `block in load_modules'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `each'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:119:in `block in load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `each'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:41:in `block in add_module_path'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `each'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `add_module_path'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:50:in `block in init_module_paths'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `each'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `init_module_paths'
from /usr/share/metasploit-framework/lib/msf/ui/console/driver.rb:196:in `initialize'
from /usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in `new'
from /usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in `driver'
from /usr/share/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in `start'
from /usr/share/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in `start'
from /usr/bin/msfconsole:48:in `<main>'
┌─[✗]─[user@parrot]─[~]
└──╼ $/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `not_after=': bignum too big to convert into `long' (RangeError)
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `sign_jar'
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:123:in `generate_jar'
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:38:in `generate'
from /usr/share/metasploit-framework/lib/msf/core/payload.rb:204:in `size'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:158:in `block (2 levels) in recalculate'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:102:in `each_pair'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:102:in `block in recalculate'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:98:in `each_pair'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:98:in `recalculate'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:251:in `block in load_modules'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `each'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:119:in `block in load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `each'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:41:in `block in add_module_path'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `each'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `add_module_path'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:50:in `block in init_module_paths'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `each'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `init_module_paths'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework.rb:121:in `simplify'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework.rb:73:in `create'
from /usr/bin/msfd:98:in `<main>'
msfconsole
[-] WARNING! The following modules could not be loaded!
[-] : Errno::ENOENT No such file or directory
Metasploit Park, System Security Interface
Version 4.0.5, Alpha E
Ready...
> access security
access: PERMISSION DENIED.
> access security grid
access: PERMISSION DENIED.
> access main security grid
access: PERMISSION DENIED....and...
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
=[ metasploit v4.16.34-dev ]
+ -- --=[ 1731 exploits - 990 auxiliary - 300 post ]
+ -- --=[ 509 payloads - 40 encoders - 10 nops ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
msf > reload_all
[*] Reloading modules from all module paths...
[-] WARNING! The following modules could not be loaded!
[-] : Errno::ENOENT No such file or directory
https://metasploit.com
=[ metasploit v4.16.34-dev ]
+ -- --=[ 1731 exploits - 990 auxiliary - 300 post ]
+ -- --=[ 509 payloads - 40 encoders - 10 nops ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
Fallo al conectar el disco duro (/home/usuario/VirtualBox VMs/ubuntu10lts/ubuntu10lts.vdi) de la ranura Puerto SATA 0 de la máquina .
Receptor RC:
NS_ERROR_ABORT (0x80004004)
Fallo al establecer dato extra de VirtualBox para la clave GUI/SuppressMessages al valor {}.
Receptor RC:
NS_ERROR_CALL_FAILED (0x800706BE)
─[user@parrot]─[~]
└──╼ $sudo apt-get install virtualbox-guest-utils
[sudo] password for user:
Leyendo lista de paquetes... Hecho
Creando árbol de dependencias
Leyendo la información de estado... Hecho
virtualbox-guest-utils ya está en su versión más reciente (5.2.6-dfsg-2).
fijado virtualbox-guest-utils como instalado manualmente.
Los paquetes indicados a continuación se instalaron de forma automática y ya no son necesarios.
liblivemedia61 libplacebo2
Utilice «sudo apt autoremove» para eliminarlos.
0 actualizados, 0 nuevos se instalarán, 0 para eliminar y 3 no actualizados.
┌─[user@parrot]─[~]
└──╼ $sudo apt-get install virtualbox-guest-x11
Leyendo lista de paquetes... Hecho
Creando árbol de dependencias
Leyendo la información de estado... Hecho
virtualbox-guest-x11 ya está en su versión más reciente (5.2.6-dfsg-2).
Los paquetes indicados a continuación se instalaron de forma automática y ya no son necesarios.
liblivemedia61 libplacebo2
Utilice «sudo apt autoremove» para eliminarlos.
0 actualizados, 0 nuevos se instalarán, 0 para eliminar y 3 no actualizados.
┌─[user@parrot]─[~]
└──╼ $sudo /usr/sbin/VBoxService -V
VBoxService: error: VbglR3Init failed with rc=VERR_FILE_NOT_FOUND
sudo /etc/init.d/virtualbox-guest-utils start
[....] Starting virtualbox-guest-utils (via systemctl): virtualbox-guest-utils.s[ ok e.
┌─[user@parrot]─[~]
└──╼ $sudo /usr/sbin/VBoxService -V
VBoxService: error: VbglR3Init failed with rc=VERR_FILE_NOT_FOUND
$sudo /etc/init.d/vboxdrv setup
[sudo] password for user:
sudo: /etc/init.d/vboxdrv: command not found
┌─[✗]─[user@parrot]─[~]
└──╼ $sudo /etc/init.d/vboxadd setup
sudo: /etc/init.d/vboxadd: command not found
vBoxClient:the VirtualBox kernel service is not running.Exiting
sudo apt-get install virtualbox-qt
[sudo] password for user:
Leyendo lista de paquetes... Hecho
Creando árbol de dependencias
Leyendo la información de estado... Hecho
virtualbox-qt ya está en su versión más reciente (5.2.6-dfsg-2).
Los paquetes indicados a continuación se instalaron de forma automática y ya no son necesarios.
glassfish-javaee php7.0-mysql python-functools32
Utilice «sudo apt autoremove» para eliminarlos.
0 actualizados, 0 nuevos se instalarán, 0 para eliminar y 1 no actualizados.
sudo apt-get install dkms gcc
[sudo] password for user:
Leyendo lista de paquetes... Hecho
Creando árbol de dependencias
Leyendo la información de estado... Hecho
dkms ya está en su versión más reciente (2.3-3).
fijado dkms como instalado manualmente.
gcc ya está en su versión más reciente (4:7.2.0-1d1).
fijado gcc como instalado manualmente.
Los paquetes indicados a continuación se instalaron de forma automática y ya no son necesarios.
glassfish-javaee php7.0-mysql python-functools32
Utilice «sudo apt autoremove» para eliminarlos.
0 actualizados, 0 nuevos se instalarán, 0 para eliminar y 1 no actualizados.
sudo apt-get update
[sudo] password for user:
Des:1 http://deb.parrotsec.org/parrot stable InRelease [14,6 kB]
Des:2 http://deb.parrotsec.org/parrot stable/main i386 Packages [16,4 MB]
Des:3 http://deb.parrotsec.org/parrot stable/contrib i386 Packages [126 kB]
Des:4 http://deb.parrotsec.org/parrot stable/non-free i386 Packages [167 kB]
Descargados 16,7 MB en 13s (1.305 kB/s)
Leyendo lista de paquetes... Hecho
sudo apt-get install kernel-headers kernel-devel
[sudo] password for user:
Leyendo lista de paquetes... Hecho
Creando árbol de dependencias
Leyendo la información de estado... Hecho
E: No se ha podido localizar el paquete kernel-headers
E: No se ha podido localizar el paquete kernel-devel
su -c '/etc/init.d/vboxdrv setup'
Contraseña:
bash: /etc/init.d/vboxdrv: No existe el fichero o el directorio
Fallo al abrir una sesión para la máquina virtual win7.
The VM session was aborted.
Result Code: NS_ERROR_FAILURE (0x80004005)
Componente: SessionMachine
Interfaz: ISession {7844aa05-b02e-4cdd-a04f-ade4a762e6b7}
sudo apt-get install linux-headers-generic
[sudo] password for user:
Leyendo lista de paquetes... Hecho
Creando árbol de dependencias
Leyendo la información de estado... Hecho
El paquete linux-headers-generic no está disponible, pero algún otro paquete hace referencia
a él. Esto puede significar que el paquete falta, está obsoleto o sólo se
encuentra disponible desde alguna otra fuente
E: El paquete «linux-headers-generic» no tiene un candidato para la instalación
sudo dpkg-reconfigure virtualbox-dkms
-------- Uninstall Beginning --------
Module: virtualbox
Version: 5.2.6
Kernel: 4.14.0-parrot13-686-pae (i686)
-------------------------------------
Status: Before uninstall, this module version was ACTIVE on this kernel.
vboxdrv.ko:
- Uninstallation
- Deleting from: /lib/modules/4.14.0-parrot13-686-pae/updates/
- Original module
- No original module was found for this module on this kernel.
- Use the dkms install command to reinstall any previous module version.
vboxnetadp.ko:
- Uninstallation
- Deleting from: /lib/modules/4.14.0-parrot13-686-pae/updates/
- Original module
- No original module was found for this module on this kernel.
- Use the dkms install command to reinstall any previous module version.
vboxnetflt.ko:
- Uninstallation
- Deleting from: /lib/modules/4.14.0-parrot13-686-pae/updates/
- Original module
- No original module was found for this module on this kernel.
- Use the dkms install command to reinstall any previous module version.
vboxpci.ko:
- Uninstallation
- Deleting from: /lib/modules/4.14.0-parrot13-686-pae/updates/
- Original module
- No original module was found for this module on this kernel.
- Use the dkms install command to reinstall any previous module version.
depmod.......
DKMS: uninstall completed.
------------------------------
Deleting module version: 5.2.6
completely from the DKMS tree.
------------------------------
Done.
Loading new virtualbox-5.2.6 DKMS files...
Building for 4.14.0-parrot13-686-pae
Building initial module for 4.14.0-parrot13-686-pae
Done.
vboxdrv:
Running module version sanity check.
- Original module
- No original module exists within this kernel
- Installation
- Installing to /lib/modules/4.14.0-parrot13-686-pae/updates/
vboxnetadp.ko:
Running module version sanity check.
- Original module
- No original module exists within this kernel
- Installation
- Installing to /lib/modules/4.14.0-parrot13-686-pae/updates/
vboxnetflt.ko:
Running module version sanity check.
- Original module
- No original module exists within this kernel
- Installation
- Installing to /lib/modules/4.14.0-parrot13-686-pae/updates/
vboxpci.ko:
Running module version sanity check.
- Original module
- No original module exists within this kernel
- Installation
- Installing to /lib/modules/4.14.0-parrot13-686-pae/updates/
depmod...
DKMS: install completed.
failed to start lsb: virtualbox linux kernel module (sale en rojo )
WARNING: The character device /dev/vboxdrv does not exist.
Please install the virtualbox-dkms package and the appropriate
headers, most likely linux-headers-686.
You will not be able to start VMs until this problem is fixed.
Kernel driver not installed (rc=-1908)
The VirtualBox Linux kernel driver (vboxdrv) is either not loaded or there is a permission problem with /dev/vboxdrv. Please reinstall virtualbox-dkms package and load the kernel module by executing
'modprobe vboxdrv'
as root.
where: suplibOsInit what: 3 VERR_VM_DRIVER_NOT_INSTALLED (-1908) - The support driver is not installed. On linux, open returned ENOENT.
apt-get install linux-headers-$(uname -r)
Leyendo lista de paquetes... Hecho
Creando árbol de dependencias
Leyendo la información de estado... Hecho
E: No se ha podido localizar el paquete linux-headers-4.13.0-kali1-686-pae
E: No se pudo encontrar ningún paquete usando «*» con «linux-headers-4.13.0-kali1-686-pae»
E: No se pudo encontrar ningún paquete con la expresión regular «linux-headers-4.13.0-kali1-686-pae»
apt-get update && apt-get upgrade -y && apt-get dist-upgrade
dd if=/dev/sda of=/dev/sdb bs=1M (con esa velocida seria lento pero no se si al subirla podria ser peor...)
sda = particion 1 original ( 400 gb )
sdb = particion 2 destino (resto gb )
"sudo chmod 000 carpeta"
"sudo chmod 000 carpeta"