In this recipe, you will use DeepExploit to compromise a victim virtual machine.
- Download a Metasploitable2 VM image.
- Run a Metasploitable2 instance on a VM.
- Obtain the IP address of your Metasploitable2.
- The next step is to set up DeepExploit's configurations.
- In a Terminal, run ifconfig to obtain your Kali Linux's IP. Edit config.ini (for example, using vim) by setting server_host under [common] to your Kali Linux IP.
- Set the values of proxy_host and proxy_port in config.ini to those in proxychains.conf.
- In the Terminal, run cat /etc/proxychains.conf and find the value next to socks4:
...snip... [ProxyList] ...snip... socks4 127.0.0.1 ...