Skip to Content
Machine Learning for Cybersecurity Cookbook
book

Machine Learning for Cybersecurity Cookbook

by Emmanuel Tsukerman
November 2019
Intermediate to advanced content levelIntermediate to advanced
346 pages
9h 36m
English
Packt Publishing
Content preview from Machine Learning for Cybersecurity Cookbook

How it works…

This recipe requires a large amount of preparation and configuration. The initial steps are to set up a victim virtual machine (steps 1 and 2). In step 3, we determine the IP address of the victim VM. Note that the credentials of Metasploitable2 are msfadmin/msfadmin. You can use the credentials to log in and then use ifconfig to obtain your Metasploitable2 IP. If you are using a Kali Linux VM and a Metasploitable2 VM on the same host, make sure that the two can communicate. For instance, put both VMs on a Host-Only Adapter and ping from your Kali Linux machine to the Metasploitable2 machine. Proceeding, we now configure DeepExploit so we can target the victim VM (steps 4-8). In steps 9 and 10, we open up Metasploit, which is ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hands-On Machine Learning for Cybersecurity

Hands-On Machine Learning for Cybersecurity

Soma Halder, Sinan Ozdemir
Machine Learning on Kubernetes

Machine Learning on Kubernetes

Faisal Masood, Ross Brigoli

Publisher Resources

ISBN: 9781789614671Supplemental Content