goodla.blogg.se

How to use nessus on metasploitable 2
How to use nessus on metasploitable 2





The last step is to configure the network address of the NAT network that will run on the virtual switch. New-NetIPAddress -IPAddress 192.168.10.1 -PrefixLength 24 -InterfaceAlias "vEthernet (NATSwitch)" The following command will assign an IP address to this virtual NIC, and this IPv4 address will act as default gateway for NAT network that we are creating.

how to use nessus on metasploitable 2

The next step updates the virtual NIC that connects the host OS to the internal virtual switch. Open an elevated Windows PowerShell console and enter the following command: New-VMSwitch -SwitchName "NATSwitch" -SwitchType Internal At the end, the virtual machines connected to the internal virtual switch will be able to talk to the host OS, but cannot talk to the external network the host OS is connected to.

how to use nessus on metasploitable 2

Instead, the host OS will have a virtual NIC that will connect to the virtual switch. This switch will not be connected to a physical NIC of the host. The first step is to create an Internal virtual switch. This will take a while and install all features related to Hyper-V. Just open an elevated Windows PowerShell console and enter the following command: Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V –All If you have not already enabled Hyper-V, just enable it via single command. The first one will be the attacker machine (kali linux) and the second one will be victim machine (metasploitable2).

how to use nessus on metasploitable 2

In this test lab, we will setup two virtual machines.

how to use nessus on metasploitable 2

This article will help you in such scenario. Since Hyper-V and VirtualBox both cannot work at the same time, you would most probably want to stick with Hyper-V for setting up your Ethical Hacking lab environment. However, if you are on Windows (Education, Professional, or Enterprise) and using Microsoft’s proprietary virtualization software Hyper-V for something important and do not want to remove it. Most of Ethical Hacking tutorials will guide you to setup the lab environment using VirtualBox since this is an open source virtualization software available for all major platforms such as Microsoft Windows, Apple Macintosh and Linux totally free of cost.







How to use nessus on metasploitable 2