November 2019
Intermediate to advanced
346 pages
9h 36m
English
This recipe requires a large amount of preparation and configuration. The initial steps are to set up a victim virtual machine (steps 1 and 2). In step 3, we determine the IP address of the victim VM. Note that the credentials of Metasploitable2 are msfadmin/msfadmin. You can use the credentials to log in and then use ifconfig to obtain your Metasploitable2 IP. If you are using a Kali Linux VM and a Metasploitable2 VM on the same host, make sure that the two can communicate. For instance, put both VMs on a Host-Only Adapter and ping from your Kali Linux machine to the Metasploitable2 machine. Proceeding, we now configure DeepExploit so we can target the victim VM (steps 4-8). In steps 9 and 10, we open up Metasploit, which is ...