How to do it...

In this recipe, you will use DeepExploit to compromise a victim virtual machine.

  1. Download a Metasploitable2 VM image.
  1. Run a Metasploitable2 instance on a VM.
  2. Obtain the IP address of your Metasploitable2.
  3. The next step is to set up DeepExploit's configurations.
  4. In a Terminal, run ifconfig to obtain your Kali Linux's IP. Edit config.ini (for example, using vim) by setting server_host under [common] to your Kali Linux IP.
  5. Set the values of proxy_host and proxy_port in config.ini to those in proxychains.conf.
  6. In the Terminal, run cat /etc/proxychains.conf and find the value next to socks4:
 ...snip... [ProxyList] ...snip... socks4 ...

Get Machine Learning for Cybersecurity Cookbook now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.