O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Initial exploitation

We will perform an initial exploitation of our windows VM:

  1. Right-click on the Windows XP VM, and select Attack | smb | ms08_067_netapi:
Armitage attack options
  1. Make any modifications necessary including changing the LHOST if needed to the IP address on the VM network. Once ready, click on Launch:
Armitage attack dialog box
  1. You will now see that the Windows XP VM machine device's icon has been changed to again identify that this machine has been owned.
Armitage main screen with indication of exploited device

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required