[go: up one dir, main page]

0% found this document useful (0 votes)
48 views3 pages

Set IP for Kali & Metasploitable VM

The document provides instructions for configuring IP addresses on Kali Linux and Metasploitable virtual machines. It explains that the IP address on Kali Linux should be set to 10.redteam#.student#.50 and on Metasploitable it should be 10.redteam#.student#.100, where # is replaced by the assigned red team number and student number. It describes editing the /etc/networking/interfaces file using Leafpad on Kali Linux and gedit on Metasploitable to set the new IP addresses, and then restarting the machines. Finally, it confirms the new IP configurations are working by pinging between the VMs.

Uploaded by

Austin Azenga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views3 pages

Set IP for Kali & Metasploitable VM

The document provides instructions for configuring IP addresses on Kali Linux and Metasploitable virtual machines. It explains that the IP address on Kali Linux should be set to 10.redteam#.student#.50 and on Metasploitable it should be 10.redteam#.student#.100, where # is replaced by the assigned red team number and student number. It describes editing the /etc/networking/interfaces file using Leafpad on Kali Linux and gedit on Metasploitable to set the new IP addresses, and then restarting the machines. Finally, it confirms the new IP configurations are working by pinging between the VMs.

Uploaded by

Austin Azenga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

IP Settings for 

Virtual Machine

Transcript

In this video, I'm going to demonstrate how to set your IP address for both the Kali Linux
attack machine and the Metasploitable victim machine.

The first thing I'm going to do is log in with username of root and the password of tour on
the Kali attack system. Keep in mind that, you know, you could use Google to find the
username and password for Kali, the default username, which is used here.

All right. The next thing I'm going to do is I'm going to check my IP address configuration
by typing ifconfig. You will see that it is just set incorrectly.

This is intentional, so we can get everyone to change their IP addresses. To change it,
we're going to use a program called Leafpad, which is basically a text editor.

And then I'm going to type /etc/network/interfaces. So, Leafpad space, forward slash etc
network Forward slash interfaces. That's what you want to type. When you type it, you'll
know you did it correctly if this file pops up that has a bunch of text in it.

Now, the only number that we have to change is this one. This is the documentation says
you need to set it to 10 dot your red team number, which is assigned to you by your
instructor dot your student number, which is also assigned in each group dot 50.

So, I'm going to go ahead and change mine. I'll just use the sample.

I'll make a red team number of 12 and a student number of 15 at the end. The last octet is
a 50. That's what we're going to put, so I have set that. Once I've said it correctly, I can go
to File, Save — then I can close the file.

Then, if you wanted to for quality assurance purposes, you could verify that you did it
using cat. Cat displays text. There, I see it's correct.

Now I'm going to restart my system. I'll do that by typing init space six

Now I'm going to log on to the Metasploitable.

You can log in as root. The password is msfadmin.

Click Continue to the root morning. Also, this one is set incorrectly. I'm going to open the
terminal.

They don't have Leafpad here.


They have gedit, so it's a text editor. You technically could do this with Vi or nano or any
text editor of your choosing. But I will do it this way because that's the way I like it.

Once again, I'll scroll down, so you can see what I typed: gedit space, forward slash etc
forward slash network, forward slash interfaces. As you see here.

This again has to be reset.

And we need to reset it to match what was set on the other system.

Just so we can see, root tour is the username and password for Kali. Give Kali a second for
the screen to initialize. I'm going to type or click on the terminal, and I'm going to type
ifconfig.

There we go, 10.12.15.50.

So, that's red team number student number dot 50. So, I'm going to need 12, 15, here and
10.

So, we're going to do 10.12.15, and then this one's going to be 100. So, the other one’s
50, the attack machine. The victim’s 100. We're going to click Save. You can close this.

Once again, if you want, you can do quality assurance.

Hit up arrow, replace gedit with cat. There, you can see I set it correctly.

There are other ways to restart the network, but it's just as fast to reboot. So, I'm going to
type init space six and that will reboot the system.

Since I have a solid straight state drive, the systems usually come up pretty quickly.

In the meantime, I don't want to waste time, so I can get prepared by typing ping
10.12.15.100. This will just keep pinging the other machine. In Linux, default is to ping
and not stop.

Let’s wait until this comes up, fully.

I could start the ping now, but I don't want to make a video where the ping’s not working.

So once again, it's root, MSF admin.

You Google the password to Metasploitable. It’s username MSF admin password MSF
admin. We just enabled the root account for you. Okay, so you see my IP 10.12.15.100.

Let's see if the thing works. It does. As I anticipated.


You can hit Control-c to stop that ping. You should technically go try to ping the attack
machine, also.

Which would be 10.12.15.50. And you can see that's also working.

So, at this point my configurations are set, and I am ready to let my team know that
everything is working on my end here.

______________________

IP Settings for CMIT 386 Virtual Machine

Kali Linux (Attack Machine) Metasploitable (victim Machine)

IP Address 10.redteam#.student#.50 IP 10.redteam#.student#.100

Subnet Mask255.255.255.0 Subnet 255.255.255.0


Mask

Gateway N/A Gateway N/A

To edit the IP configuration file on Kali, use:       leafpad   /etc/networking/interfaces

To edit the IP configuration file on Metasploitable, use: gedit  /etc/networking/interfaces

You might also like