From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Scripting a juicy attack

Scripting a juicy attack

- [Instructor] We've created our new plan, which we've called Juicy. The top middle panel allows us to define the hosts that we'll be using in the script, and any other variables that we might want to define. When defining our attack, we can either code the IP addresses that we're targeting directly, or for clarity, we can use variable names. Let's add one. And we'll call it juice. And for the value we'll put 10.0.2.40, its IP address. Okay, let's code the start of the attack, and we'll start by putting STAGE 1. The attack script will pause whenever it reaches a STAGE action. So when we run the script, we'll be waiting at this point. The script contains a management interface, which will allow us to begin the attack. We can run it through to completion, or we can include additional STAGE commands and run it in stages, which we may want to do when running a cyber range exercise, or a workshop. Our first real command we'll code is to do a port scan of the juice server using Nmap. We do…

Contents