This is my certificate of completion for Penetration Testing & Ethical Hacking course from Cybrary.it.
Being able to create machines within machines has been the aspiration of humanity since the days of alchemical yore. What we see here is the Windows 10 host Command Line Prompt “talking” via the ping utility to a Kali Linux VirtualMachine on Oracle’s Virtualbox, which is conversely talking over the “wire” to the host machine using ping. This is the basic proof-of-work demonstration of electronic warfare. The next steps are spoofing, redirecting, passive sniffing, phishing, and exploitation.