We need three virtual machines to recreate this attack. I used virtual box to setup these virtual machines. All three machines must be on same subnet.
All three machines are in “Nat in network” mode.
Attacker machine can be of any OS. Victim should be of Windows OS(any windows OS will do good for demo)
- Virtual Machine 01 – Kali – 10.0.2.9
- Virtual Machine 02 – Windows 7 – 10.0.2.10
- Virtual Machine 03 – Windows 10 – 10.0.2.11
- Download “seth” from GitHub. Link to Download
- Go to the folder where tool is downloaded.