[go: up one dir, main page]

0% found this document useful (0 votes)
60 views12 pages

Lab 1 - Introduction To Virtual Lab Setup

The document outlines a lab aimed at establishing a secure virtual environment for ethical hacking practice using virtualization software like VirtualBox or VMware. It includes objectives, learning outcomes, and a detailed step-by-step guide for installing and configuring Kali Linux and Metasploitable, as well as setting up network settings for connectivity. The estimated time for completion is 2-3 hours.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views12 pages

Lab 1 - Introduction To Virtual Lab Setup

The document outlines a lab aimed at establishing a secure virtual environment for ethical hacking practice using virtualization software like VirtualBox or VMware. It includes objectives, learning outcomes, and a detailed step-by-step guide for installing and configuring Kali Linux and Metasploitable, as well as setting up network settings for connectivity. The estimated time for completion is 2-3 hours.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Lab 1: Introduction to Virtual Lab Setup

Objectives:
 To establish a secure environment for practicing ethical hacking techniques.
 To gain proficiency in using virtualization software.
 To learn the installation and configuration of Kali Linux and Metasploitable.
 To ensure a functional network setup for ethical hacking practice.

AIM:
To establish a secure virtual environment where students can safely practice ethical
hacking techniques without risking harm to live systems.

Estimated Time: 2-3 hours.

Learning Outcomes:
 Understand the importance of a secure virtual lab environment.
 Gain hands-on experience in setting up VirtualBox or VMware.
 Install and configure Kali Linux and a vulnerable OS like Metasploitable.
 Ensure proper network settings to facilitate ethical hacking practice.

Methodology:
 Detailed step-by-step instructions to set up VirtualBox/VMware.
 Download and install Kali Linux and Metasploitable.
 Configure network settings for secure and isolated testing.
 Verify connectivity between VMs.

Step-by-Step Guide:

Step 1: Install Virtual Box or VMware


Virtual Box:
 Download Virtual Box:
 Go to the Virtual Box website.
 Download the appropriate version for your operating system (Windows, mac OS, or
Linux).

 Install Virtual Box:


 Run the downloaded installer
 Follow the on-screen instructions to complete the installation

 Check if application is installed/ready


Step 2: Download and install machines (Install kali Linux)
 Go to the Kali Linux website:
 Navigate to the "Downloads" section.

 Download the appropriate ISO image for your system (64-bit or 32-bit). (Or)
 As Beginners it is best to use pre built machine which is easy to use
 Download machine for virtual box

Step 3: Download Metasploitable ISO


 Go to the Metasploitable download page:
Step 4: Set Up Kali Linux in Virtual Box/VMware
 Open Virtual Box and Add a machine:
 GUI of Virtual Box
 Click on ‘Add’ (Note: Make sure you have Unzipped the Kali-linux file)

Navigate to your specefic folder and select your machine from the extracted and click
‘Open’

Step 5: Set Up Metasploitable in Virtual Box/VMware


 Open Virtual Box and create a new virtual machine
 Click "New." (Note: Make sure you have extracted the file)
Click on ‘Expert Mode’ before giving assigning the machine name
 Name the VM (e.g., "Metasploitable"), and select "Linux" and "Ubuntu (64-bit).
 Assign all the details given as shown below(name can be customized)

 Click on ‘Hardware’ tab


 Select ‘Use Existing Virtual Had Disk File’ and Click on ‘Add’ and select file

 Click on finish to create new machine.

Step 6: Configure Network Settings


 Set up network: Assign VMs to the host-only network:
 In Virtual Box, select each VM, go to "Settings" > "Network," and attach the VM
to the host-only network.
 Note: (Best if Bridged Adapter is selected as)
 ‘Bridged adapter’ allows you to perform activities on a on connected network
unlike ‘host-only adapter’ which is among VMs

Step 7: Verify Connectivity


 Start both VMs (Kali Linux and Metasploitable).
(Note: As we are using prebuilt machines. They have pre-set password and
username
o Kali – ‘kali’ is the user name and password for kali linux
o Metasploitable – ‘msfadmin’ is user name and password

 Open a terminal in Kali Linux:


o Ping the Metasploitable IP address to verify connectivity.
o Example: ping 192.168.56.102 (replace with the actual IP address of
Metasploitable).

You might also like