From the course: Kali Linux Essential Training
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Running our first cyber range attack - Linux Tutorial
From the course: Kali Linux Essential Training
Running our first cyber range attack
- [Instructor] Now that we have a generated attack script, we can run it. We'll navigate to where the script was generated, cd kali-autopilot/juicy, and we'll run the script just by saying python3 juicy.py. This starts up the attack script and waits. Kali Autopilot incorporates a management interface into the generated script. It has two API endpoints, check and set, and we use our web browser to access them. The first thing we'll do is to check the current status, HTTP 127.0.0.1, our local system slash check. And we have to enter some credentials, which by default are offsec offsec and we see that we're at stage zero of one stage. To start the attack, we set what's known as a mutext to the stage of the attack that we want to run, and we do that by saying set mutex equals 1. And we can see we've now initiated the attack. Back in the terminal, we can see our script is running, executing each command that we coded…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.