Objective:

For this challenge, you’ll need two VM’s

You will not have access to the login credentials for this machine. We will need to discover the IP address once it is powered on. (Follow the setup directions right below this before powering it on.)

Open up the VM hosting the vulnerable web application in VMWare and give it a unique MAC address. (We’ll use arp-scan within Kali to locate its IP address in the next step.)

                              **(You can Double Click on these images to zoom in.)**

Untitled

Start the vulnerable VM and then log into Kali Linux. We’ll be able to locate the IP address of the Vulnerable VM from Kali by running arp-scan and piping the results to grep.

sudo su
arp-scan --localnet | grep **-i** MAC_ADDRESS_OF_VULNERABLE_VM

Untitled

In my case, the IP Address of the target VM is 192.168.228.47.

NMAP results:

nmap -sC -sV 192.168.228.47

Untitled