O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

We will now elevate privileges in Linux:

  1. Start by finding the IP address of the VulnOS2 image – we can use a simple nmap scan to find it. Open a terminal window by clicking on the terminal icon.
  2. Enter the following commands to run a quick nmap for the host-only network of 192.168.56.0/24:
nmap -T4 -F 192.168.56.0/24
  1. From our output, we can see that the address of the machine is 192.168.56.104:
Kali console output
We are going to use this exploit through SSH access to the device. Local access to the device will work; however, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required