Summary of pitfalls in importing ova files into vmware

Summary of pitfalls in importing ova files into vmware

Source of the problem

As we all know, all network behaviors will generate corresponding network traffic, and all network attack behaviors also have their corresponding traffic characteristics. So, is it possible to analyze what attack behavior it corresponds to based on the traffic characteristics?

I used the Vulnhub range environment on the virtual machine to simulate the attack, and then used Wireshark to capture packets and analyze the traffic.

Problems

Because the vulnhub environment is a virtual machine of the ova file, it needs to be opened with virtualbox, but I have never used vbox, so I wanted to import it into vmware for testing. Soon I encountered the first problem: when I imported the ova file into vmware, an error message appeared. The error is as follows:

I tried to relax the OVF specification and virtual hardware compliance checks, but another error was reported, as follows:

I found a lot of tutorials on the Internet, such as re-downloading vtools, changing the sha1 value of the vmdx file after decompressing the ova file, etc. After trying, I found that none of them worked. After that, I consulted many classmates but still couldn't find an effective solution.

Workaround

Finally I consulted teacher AJEST and found a solution. I would like to express my gratitude here!

Decompress the ova file to get two files with suffixes ovf and vmdx. Use Notepad to open the ovf file and change the following statement to the corresponding vmware version. For example, I use version 15.5, so I change it to

<System>
  <vssd:ElementName>Virtual Hardware Family</vssd:ElementName>
  <vssd:InstanceID>0</vssd:InstanceID>
  <vssd:VirtualSystemIdentifier>DC-1</vssd:VirtualSystemIdentifier>
  <vssd:VirtualSystemType>vmx-15.5</vssd:VirtualSystemType>
</System>

After that, import the decompressed ovf file. An error will still be prompted for the first time. Just click Retry.

other

After solving the above problems, I encountered other problems. I couldn't capture the three-way handshake process between my two virtual machines. The reason was that my virtual machine network was set to host-only mode. In this case, there was no way to capture the virtual machine's packets on the physical host because the corresponding virtual network card would not be generated on the physical host. You just need to change the network card to NAT mode.

This is the end of this article about the pitfalls of importing ova files into vmware. For more relevant content about importing ova into vmware, please search for previous articles on 123WORDPRESS.COM or continue to browse the related articles below. I hope you will support 123WORDPRESS.COM in the future!

You may also be interested in:
  • Easy to play VMWare virtual machine installation GHOST system graphic tutorial
  • Solution for VMware Workstation Pro not running on Windows
  • VMware settings bridge Internet access (illustration and detailed explanation)
  • Detailed introduction to CentOS 7 network settings in vmware
  • How to use VMware (with pictures and text)
  • Solution to VMware virtual machine NAT mode can not connect to the Internet
  • Tips for optimizing and improving the speed of VMware virtual machines (detailed graphic tutorial)
  • The difference between VMware's three network connection methods
  • VMware Workstation 5.5.3 Build 34685 Chinese patch
  • How to set up folder sharing in CentOS 7 in VMware

<<:  Using jQuery to implement the carousel effect

>>:  How to use MySQL covering index and table return

Recommend

JavaScript to implement checkbox selection or cancellation

This article shares the specific code of JavaScri...

HTML introductory tutorial HTML tag symbols quickly mastered

Side note <br />If you know nothing about HT...

Detailed explanation of the usage and difference between nohup and & in Linux

Example: We use the Python code loop_hello.py as ...

SQL-based query statements

Table of contents 1. Basic SELECT statement 1. Qu...

How to use react-color to implement the front-end color picker

background We can use react-color to implement th...

Example code for implementing a QR code scanning box with CSS

We usually have a scanning box when we open the c...

Beginners understand MySQL deadlock problem from source code

After many difficult single-step debugging late a...

A brief discussion on React native APP updates

Table of contents App Update Process Rough flow c...

Disadvantages and reasonable use of MySQL database index

Table of contents Proper use of indexes 1. Disadv...

How to install redis in docker and set password and connect

Redis is a distributed cache service. Caching is ...

Implementation of breakpoint resume in Node.js

Preface Normal business needs: upload pictures, E...

A bug fix for Tomcat's automatic shutdown

Preface Recently, a Java EE web project that has ...

Significantly optimize the size of PNG images with CSS mask (recommended)

This article is welcome to be shared and aggregat...

Solution to MySQL server login error ERROR 1820 (HY000)

Fault site: Log in to the MySQL server and get th...

Detailed explanation of the concept of docker container layers

Table of contents 01 Container consistency 02 Con...