First, thanks for getting back to me. Second I think I’ve got all the screenshots you want!
Ifconfig of Kali machine:
ifconfig of Metasploitable machine:
route -n of Kali machine:
route -n of Metasploitable machine:
Network settings of Kali VM:
Network settings of Metasploitable machine:
I think that is them all and I hope they work. Phew!!!! There must be easier ways to add images to a question in this forum!
I tried the nc command directly on the metaspoitable machine and got exactly the same response which is interesting. What is also interesting is that in the lecture about code execution vulnerabilities I was able to execute the nc command on the metaspoitable machine perfectly and it established the shell. So what do you think all this means?
Thanks for your help and regards.
Nick