Closed farhangamary closed 1 year ago
Any fix or suggestion please?
The script is failing when accessing this backdoor:
https://github.com/rapid7/metasploitable3/blob/master/resources/backdoors/caidao.asp
You can read source code - the file contents are plain text.
You could try removing the contents of the file so that the image is built with an empty file. However, it is likely that the build will fail when processing other files, such as the other backdoors:
I will of course not deactivate the defender or let any harmful or suspicious file.
Perhaps reconsider what you are trying to achieve. You are working with intentionally vulnerable and malicious files.
If someone has network access to your Metasploitable host, a deliberately malicious or "suspicious" backdoor is barely worse than an intentionally vulnerable and exploitable application.
Yes, no backdoor could be copied because of the defender, so the script failed - I have found a safe workaround for it. As it is explained and it was indeed no issue I am closing this report.
Issue Description
Trying to build the virtualbox artifact manually from cloned source code with packer - using the _windows_2008r2.json template, it downloads the files starts the virtualbox, installs the machine and starts it successfully:
but at the end when trying to make the vagrant box file, my windows defender, detects a backdoor or a virus and doesn't let it to get copied:
Is something wrong with the whole process? Any fix or suggestion please? - I will of course not deactivate the defender or let any harmful or suspicious file.
Host System
Command Output