July 8, 2020 at 4:07 am
#41625
Diego Pérez
Moderator
Hi Arminius!
The problem is that you are using bridged mode which is ro unreliable and more if you are attacking your host machine, also you won’t be able to pivot to metasploitable this way, you’ll need to use the 3 as virtual machines if you want to try this attack.
Hope it helps!
Diego