NullBytes VM

First I set up my two machines: the attacker and the target. Since Kali is a Linux distro with lots of fun hacking tools already installed, this is what I used for my attacker machine (read: I’m lazy and don’t want to type sudo “apt-get install” fifty billion times). I obtained the target machine (“NullBytes”) …