In this recipe, you will use DeepExploit to compromise a victim virtual machine:
- Download a Metasploitable2 VM image.
- Run a Metasploitable2 instance on a VM.
- Obtain the IP address of your Metasploitable2.
- In your Kali Linux machine, you should be able to see your Metasploitable2's website instance by typing Metasploitable2's ip address:80 into a web browser:
- In a Terminal, run ifconfig to obtain your Kali Linux's IP. Edit config.ini (for example, using vim) by setting proxy to empty, server host to your Kali Linux IP, LHOST to your Metasploitable2 IP, and LPORT to 80.
- Open the host file and add the Metasploitable2 web server ...