Alrighty, So I'm doin a pentest on my friends web server, Using a kali vm on virtualbox (don't have the hardware to currently dual boot) and I know my way around some tools, mainly recon. A bit of metasploit, my question is, this server has many open ports running a lot of services, even bloody pop3 (port 110)! My question is, due to me being in a vm, seems like I can't connect to the metasploit db and therefor don't have any access to the payloads/exploits. any way to circumvent this? Do I have to reconfigure something? traffic can get out just fine as I'm running a Sparta scan on it.