ReplyDec 7, 2017
Thanks wizzy . Couple of questions" When you mention that you would setup a host-only network with SSH enabled, did you mean that you would setup a SSH server on Kali and connect into it? If so, how would that minimize the likelihood of attacks on your box if you're running Kali in a VM? (I may not be understanding the config) In terms of ensuring services are bound to the right adapter, how do you go about verifying that? I'm assuming they should be bound to the host-only adapter. Thanks for replying.