From the course: Kali Linux Essential Training

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Running our first cyber range attack

Running our first cyber range attack - Linux Tutorial

From the course: Kali Linux Essential Training

Running our first cyber range attack

- [Instructor] Now that we have a generated attack script, we can run it. We'll navigate to where the script was generated, cd kali-autopilot/juicy, and we'll run the script just by saying python3 juicy.py. This starts up the attack script and waits. Kali Autopilot incorporates a management interface into the generated script. It has two API endpoints, check and set, and we use our web browser to access them. The first thing we'll do is to check the current status, HTTP 127.0.0.1, our local system slash check. And we have to enter some credentials, which by default are offsec offsec and we see that we're at stage zero of one stage. To start the attack, we set what's known as a mutext to the stage of the attack that we want to run, and we do that by saying set mutex equals 1. And we can see we've now initiated the attack. Back in the terminal, we can see our script is running, executing each command that we coded…

Contents