Blog
Jun 19, 2009
Installing BackTrack 4 as a VMware Guest
Installing BackTrack 4 as a VMware Guest
1 min read

As we havn’t released a VMware image yet, and vmware-tools does not play nice with our 2.6.29.4 kernel, i thought i’de post a short how-to on getting VMware tools installed in BT4 as a VMware guest. I used VMware Workstation 6.5.2 to test this.
The BackTrack kernel sources are already in place, so all that’s left to do is install BackTrack in VMware and start the VMware tools install. BackTrack uses up around 5 GB once installed, so plan accordingly.
mkdir /mnt/cdrom
mount /dev/cdrom3 /mnt/cdrom
cp -rf /mnt/cdrom/VMwareTools-7.8.5-156735.tar.gz /tmp/
cd /tmp/
tar zxpf VMwareTools-7.8.5-156735.tar.gz
wget www.offensive-security.com/tools/vmware-tools-patch-backtrack4-7.8.5-2_6_29.tar
tar zxpf vmware-tools-patch-backtrack4-7.8.5-2_6_29.tar
./vmwaretools.sh
Once this is done, run the vmware-install script as instructed, and you should be home free!
Cybersecurity leader resources
Sign up for the Secure Leader and get the latest info on industry trends, resources and best practices for security leaders every other week
Latest from OffSec

Insights
Women in Cybersecurity Leadership: Inspiring Role Models at the Top
Celebrate Women’s History Month by recognizing the women shaping cybersecurity and driving innovation in the industry.
Feb 24, 2025
11 min read

Federal
Addressing the Unique Cybersecurity Challenges Faced by Government Agencies
Explore the unique cybersecurity challenges government agencies face and how tailored strategies can protect national security and public trust.
Feb 12, 2025
8 min read

Enterprise Security
Building a Cyber-Resilient Public Sector Through Hands-on Security Training
Learn how hands-on cybersecurity training equips public sector teams to protect critical infrastructure, featuring real-world cases from Atlanta, Oldsmar, and Texas that demonstrate why practical experience trumps theoretical knowledge alone. Discover why agencies are moving beyond certifications to combat-ready security training.
Feb 5, 2025
4 min read