Skip to Content
Machine Learning for Cybersecurity Cookbook
book

Machine Learning for Cybersecurity Cookbook

by Emmanuel Tsukerman
November 2019
Intermediate to advanced content levelIntermediate to advanced
346 pages
9h 36m
English
Packt Publishing
Content preview from Machine Learning for Cybersecurity Cookbook

How to do it...

In this recipe, you will use DeepExploit to compromise a victim virtual machine:

  1. Download a Metasploitable2 VM image.
  2. Run a Metasploitable2 instance on a VM.
  3. Obtain the IP address of your Metasploitable2.
  4. In your Kali Linux machine, you should be able to see your Metasploitable2's website instance by typing Metasploitable2's ip address:80 into a web browser:
  1. In a Terminal, run ifconfig to obtain your Kali Linux's IP. Edit config.ini (for example, using vim) by setting proxy to empty, server host to your Kali Linux IP, LHOST to your Metasploitable2 IP, and LPORT to 80.
  2.  Open the host file and add the Metasploitable2 web server ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hands-On Machine Learning for Cybersecurity

Hands-On Machine Learning for Cybersecurity

Soma Halder, Sinan Ozdemir
Machine Learning on Kubernetes

Machine Learning on Kubernetes

Faisal Masood, Ross Brigoli

Publisher Resources

ISBN: 9781789614671Supplemental Content