So you’ve got your lab setup and you’ve been over to Vulnhub.com and you’ve downloaded a vulnerable virtual machine such as Kioptrix 1.1.
You have managed to install the VM into your favourite hypervisor such as Virtual Box or VMWare and get it booted. You are presented at this stage with a login screen for the VM.
At this point before you can start enumerating with NMap etc you will need to find out the IP address of that VM. To do this load Kali and open a terminal window. Then use the tools below to scan the local network
NB Ensure that both Kali and the vulnerable VM are both on internal (host only) networks.
Tools
Netdiscover
Simply type the following at the command prompt.
Netdiscover
NMap Ping Sweep
First of all you need to know your own IP address so that you can workout the subnet to scan. Do this by entering
ifconfig
at the terminal prompt.
Once you get the result back enter the following
nmap -sn 172.168.56.0/24
replacing the IP address and subnet mask with your own.
Arp-Scan
At the terminal enter the following:
arp-scan -l
All of these tools will help you discover the IP addresses of devices on your subnet.