Ch4inrulz: 1.0.1 Walkthrough
Lab Environment Attacker’s Machine : Linux kali 4.18.0-kali2-amd64 #1 SMP Debian 4.18.10-2kali1 (2018-10-09) x86_64 GNU/Linux Vulnerable Machine : Solid State: 1 Let’s start hacking and breach the security of this machine Scanning Phase : Let’s start with knowing our attacking machine’s ip Syntax used : ifconfig Results : 192.168.146.131 Now let’s scan our local network to which attacking machine and vulnerable machine is connected. Syntax used : arp-scan --local Victim machine : 192.168.146.135 Enumeration Phase : Now using nmap to scan the services running on ports . Syntax used : nmap -A 192.168.146.135 -p- -Pn...