i have the project done i just need you to run a demo for 3 attacks and screen record and write a script on what you did and ill send the project after you accept you need You need 3 main programs/files:
1. UTM or VirtualBox
This is the program that runs the virtual machines.
Since you are on Mac, use UTM.
2. Kali Linux VM
This is the attacker machine.
You use it to run:
nmapmsfconsole/ Metasploithydra- browser for DVWA
3. Metasploitable 2 VM
This is the victim machine.
You need this exact VM because it has:
vsftpd 2.3.4for the backdoor attack- FTP login for Hydra
- DVWA for command injection
4. Wireshark
Usually already inside Kali.
It captures attack traffic, but for your demo you mainly need the 3 attacks.
Leave a Reply
You must be logged in to post a comment.