

Since port 443 is running, we open the IP in the browser. In our attacker virtual machine ( Kali), we run the netdiscover command to find information about the network. We assume that the virtual machines have been previously installed and that they are in the same network. Wazuh: The Wazuh OVA is the easiest method to setup the Wazuh Manager integrated with the Elastic Stack.


Attacker: Kali Linux or you can manually install Metasploit in any virtual machine.Victim: The vulnerable machine DC:1 from VulnHub.With this goal, we prepare a small lab with three virtual machines: Then, we will repeat the attack but this time with Wazuh installed in the vulnerable system. We will simulate a real attack where the attacker uses Metasploit to exploit vulnerabilities in a Linux system and gains root access. It contains a suite of tools that you can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. This framework is the most used penetration testing framework in the world.
DRUPAL LOGS HOW TO
We are going to attack a vulnerable server using Metasploit and then we will see how to use Wazuh to detect various of its attacks.
