November 2019
Intermediate to advanced
346 pages
9h 36m
English
Steps 1-3 are no different than in the recipe for DeepExploit, where we prepared a victim VM. The credentials of Metasploitable2 are msfadmin/msfadmin. You can use the credentials to log in and then use ifconfig to obtain your Metasploitable2 IP. If you are using a Kali Linux VM and Metasploitable2 VM on the same host, make sure that the two can communicate. For instance, put both VMs on a Host-only Adapter and ping from your Kali Linux machine to the Metasploitable2 machine. Next, we verify that the environment has been properly set up by checking that we are able to access the victim VM's web page in step 4. In step 5 and step 6, we configure GyoiThon in preparation for our pen test. Having finished setting up our environments, ...