First let’s scan where our target resides on our network by issuing an arp-scan command. ┌──(root💀kali)-[~/Desktop/VulnHub/DC9]
└─# arp-scan 192.168.1.0/24
Interface: eth0, type: EN10MB, MAC: 00:0c:29:d7:d3:5f, IPv4: 192.168.1.14
Starting arp-scan 1.9.7 with 256 hosts (https://github.com/royhills/arp-scan)
192.168.1.13 00:0c:29:be:a0:e7 VMware, Inc. 6 packets received by filter, 0 packets dropped by kernel
Ending arp-scan 1.9.7…