The first write-up of an attack done through a Kali VM to another Metasploit 2 VM.
This repository documents the details of a cyber attack, including the attack vector, indicators of compromise (IoCs), logs, and mitigation steps.
- Attack Report
- Screenshots
- Indicators of Compromise
- Logs and Analysis
- Mitigation Strategies
- Exploits and Proof of Concept
- References