![]() ![]() The second Linux virtual machine that we will use is the Metaspoitable2 VM created in the Virtual Box in the same way as you created the Kali Linux machine. ![]() Kali Linux is known as one of the best hacking distributions providing an entire arsenal of penetration testing tools and Metasploit is already built into Kali Linux. ![]() The first one is the Kali Linux virtual machine that you have already created in an earlier lab. We will use two VirtualBox Linux VMs in this exercise. This scan identifies the open ports and services on the target machine. Once it is confirmed that the target machine is reachable, a preliminary scan is performed on the target machine using the nmap command. The next step is to check that the target machine is reachable by pinging it from the Kali Linux VM. From the Kali Linux VM, a whois command is run on the target machine's IP address, which provides information on the NetName and NetType. The IP address is assumed to be 192.168.1.103. Once the virtual machines are set up, the next step is to determine the IP address of the target machine by running the "ifconfig" command on the Metasploitable2 VM. The network adapter for both VMs should be set to bridge mode to enable them to get their IP addresses. The first step is to set up the virtual machines with the Metasploitable2 VM as the target machine and the Kali Linux VM as the attacking machine. This assignment involves using two virtual machines, Kali Linux and Metasploitable2, to perform a penetration testing exercise.
0 Comments
Leave a Reply. |