Using VirtualBox & public virtual network, please complete the following tasks:

Using VirtualBox & public virtual network, please complete the following tasks:
1) Using Kali Linux & Windows 10 (25 pts):
a) What is the IP & MAC addresses for your Kali Linux? Write down the IP address addresses. Take a screenshot showing the MAC address selected. (2 pts)
b) Find the IP address of Windows. Take a screenshot. (2 pts)
c) Find the arp cache/table on Windows. Take a screenshot. (2 pts)
d) Using the command prompt in Windows, connect to Kali Linux machine. Take a screenshot. That is, what tool would you use from the command prompt in Windows to communicate with Kali (2pts)
e) Using a terminal in Kali Linux, what is the IP address of google.com? Take a screenshot. (2 pts)
f) Use the bettercap tool in Kali to start man-in the middle & do the following (15 pts):
▪ Go to Windows & take a screenshot showing arp cache/table before you start man-in-the middle attack (2.5 pts)
▪ Go to Kali. & start man-in the middle using the bettercap tool. Take a screen shot of Kali showing the services running in bettercap that are needed to start man-in-the middle attack successfully including the service to spoof the mac address & the services to capture packets (5 pts)
▪ Go back to Windows & take a screenshot showing arp cache/table after you started man-in-the middle attack (2.5 pts)
▪ Stop man-in-the-middle attack. Take two screenshots showing that the man-in-the middle attack has really stopped. One shot from Kali showing the services are not running. The other shot in Windows showing the arp cache (5 pts)
2) Using Kali & Metasploitable (15 pts):
a. Shutdown Windows machine & start Metaploitable using a public network.
b. Start a chatting session between Kali & Metasploitable. Take a screen shot of both machines showing the chatting session between the two virtual machines (7.5 pts)
c. Go to Kali and scan the first/common 50 ports on Metasploitable. Take a screenshot of Kali showing the command. (7.5 pts)
3) Using Kali Only (10 pts):
a. Shutdown Metasploitable.
b. Using the social engineering tool kit in Kali, clone a website such as Google. Take a screen shot of the terminal windows showing the commands & submenus as we did in lecture. (5 pts)
c. Open firefox browser in Kali & show that the website is in fact cloned. Take a screenshot of that web page. (5 pts)