This is my walk though of how I broke into pWnOS v1.
pWnOS is on a "VM Image", that creates a target on which to practice penetration testing; with the "end goal" is to get root. It was designed to practice using exploits, with multiple entry points.
A company dedicated to serving Webhosting hires you to perform a penetration test on one of its servers dedicated to the administration of their systems. It's a linux virtual machine intentionally configured with exploitable services to provide you with a path to r00t :).
I had problems with the Debian OpenSSH/OpenSSL exploit, some times it would work, else it would be really slow or just cant find the correct exploit file.
The method which I use, turns it into a offline attack, which makes it more stealthy as it will not log failed logins (e.g. /var/auth/auth.log. See here for extra info).
This is one method of getting in, the author did say that there is multiple ways in!
It took me a bit of work to also to get it to work with virtual box & static IP addresses.
Read my post here (hxxp://forums.heorot.net/viewtopic.php?f=21&t=373&sid=0c8dfabcd25921209e26bf92fb8c44d3) (short answer - need configure another interface via another OS)