This project demonstrates cybersecurity concepts including backdoors, persistence mechanisms, and reverse shells for educational purposes only. All testing must be done in isolated virtual machines.
- [Student 1 Name]
- [Student 2 Name]
- [Student 3 Name]
- Virtual Machine software (VirtualBox/VMware)
- Isolated VM network
- Python 3.6+ on all machines
- Create two VMs:
- Target VM: Runs the game
- Attacker VM: Runs the listener
- Configure Host-Only Network:
- IP Range: 192.168.56.0/24
- Target VM IP: 192.168.56.101
- Attacker VM IP: 192.168.56.1
cd server python file_server.py