Double Trouble VulnHub Walkthrough: Step-by-Step Guide to Solving ‘Machine Inside a Machine’ for…
设置实验环境时,需将Kali Linux和Double Trouble VM连接至桥接网络,并在同一局域网中启动两者。通过运行sudo netdiscover扫描本地网络以识别目标IP地址。 2025-8-12 06:8:11 Author: infosecwriteups.com(查看原文) 阅读量:14 收藏

Prajwal

Before you start attacking the Double Trouble machine, it’s important to set up your lab environment properly.

  1. Connect Both VMs to a Bridged Network Adapter:
    Ensure that both your Kali Linux attacking machine and the Double Trouble target VM are configured to use a bridged network adapter. This setup places both machines on the same local network, enabling seamless communication between them.
  2. Power On Both Machines:
    Boot up Kali Linux and the Double Trouble VM.
  3. Discover Double Trouble’s IP Address:
    On your Kali Linux terminal, run the following command to scan the local network and identify active devices:
sudo netdiscover

This scans your subnet and lists all detected IP.

Identify the Target IP:
From the list, find the IP address corresponding to the Double Trouble VM. Its MAC address might help you identify it if you’re unsure. The IP address will look something like 192.168.1.28 but may vary depending on your network.


文章来源: https://infosecwriteups.com/double-trouble-vulnhub-walkthrough-step-by-step-guide-to-solving-machine-inside-a-machine-for-b89b3561407e?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh