Implementation scheme of mutual access between kali linux host and virtual machine

1. In the attack and defense simulation, install DVWA into your own host, and start the sniffing attack through sqlmap and other tools in kali Linux, you need to configure the network. The virtual machine adopts bridge mode and replicates the Mac address status.

2. Check the IP addresses of the respective systems. The Windows system command is ipconfig, and the Linux system command is ifconfig. Make sure that the IP addresses of the two systems are on the same network segment.

The screenshot below is of my own computer's network card driver. In order to ensure no interference, the wireless driver is disabled, only the network card driver of the current virtual machine and the host's driver are provided, and the iPV4 in the VMware netWork Adapter VMnet8 ip address is modified to be obtained automatically.

3. Since the previous network connection is a wireless network, it is necessary to refresh the IP address, otherwise the address may be cached from addresses that are not on the same network segment. In the settings, it is found that the copying of the physical network connection status should be removed.

 

The above picture shows that the configuration displayed is the IP address of the wireless configuration because the IP address is not refreshed. The address after refresh is as follows:

4. At this time, the host can access the virtual machine, but the virtual machine cannot ping the same host when it is listed. This is because the firewall of the host machine is turned on, and the firewall settings are turned off.

After that, I turned off the firewall settings of the host machine and accessed the host machine again, but after testing, it was not actually a firewall problem. The second is the configuration problem of the virtual network card driver DHCP. So just check the IP address of the system and then reconfigure it to access it. Change the bridge mode to net mode.

 

5. The network environment has been configured. Now install your own DWVA and Wampserver on the host. In the previous article, I have explained how to configure DWVA, so I will not repeat them here.

6. Modify the web page address of DWVA in the host, and configure it according to the IP address of the host

 

7. For subsequent attacks, refer to the sqlmap example I wrote before.

 

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=326389725&siteId=291194637