STEP 1: Check the Network settings in VirtualBox
The Attacker and the Victim should be on the same network. Here, the victim's Windows 10 and the attacker's Kali are on the same Wi-Fi network so we are using Bridged Networking. This is how it looks:
Screenshot (12).png728x451 53.9 KB
STEP...