Thanks Steve, I was going to suggest the same,
simpler to direct the output into a text file and then into code tags here instead of screenshots.
Now I don't need to. I think it would help the OP get a answer on the Kali forum,
if they at least make the effort to learn how to use code boxes and post the output and code as text, instead of screen shots.
I see your post got approved, just yesterday,
If you "Wanna be a cracker hacker", you really need to learn how to search
and look through tons of data, to find the back yards, and back doors.
I did a quick search on the kali forum for you:
Found:
https://forums.kali.org/showthread.php? ... ork-Access
And
https://forums.kali.org/showthread.php? ... onnections
---------------------------
https://docs.kali.org/installation/trou ... ver-issues
After trying all the things in the tutorial, if you still can not make a connection,
you should ask again, but in the appropriate topic/thread.
The OP needs to learn a lot, and how to do these things on their own. Hopefully this helps them get started.
======== edited =========
Problem: Kali does not recognize any ethernet/wifi connection.
I have also asked in Kali Linux forums, but it's taking a lot of time for my post to be approved, so I'd like to ask here as well, since it could be a problem not strictly related to Kali.
Again, it is very much related to Kali, you need to read their documentation,
they do have plenty on how to solve this.
The solution is there, but I all ready have done way to much for the OP :
https://docs.kali.org/category/general-use
In keeping with the Kali Linux Network Services Policy, there are no network services, including database services, running on boot so there are a couple of steps that need to be taken in order to get Metasploit up and running with database support.
Follow the "read more" link, and then there is more,they go into great detail on this, and it is clear, easy to follow documentation.
=====================================
https://docs.kali.org/policy/kali-linux ... e-policies
Kali Linux is a penetration testing toolkit, and may potentially be used in “hostile” environments. Accordingly, Kali Linux deals with network services in a very different way than typical Linux distributions. Specifically, Kali does not enable any externally-listening services by default with the goal of minimizing exposure when in a default state.