Lab 1: Introduction to Virtual Lab Setup
Objectives:
To establish a secure environment for practicing ethical hacking techniques.
To gain proficiency in using virtualization software.
To learn the installation and configuration of Kali Linux and Metasploitable.
To ensure a functional network setup for ethical hacking practice.
AIM:
To establish a secure virtual environment where students can safely practice ethical
hacking techniques without risking harm to live systems.
Estimated Time: 2-3 hours.
Learning Outcomes:
Understand the importance of a secure virtual lab environment.
Gain hands-on experience in setting up VirtualBox or VMware.
Install and configure Kali Linux and a vulnerable OS like Metasploitable.
Ensure proper network settings to facilitate ethical hacking practice.
Methodology:
Detailed step-by-step instructions to set up VirtualBox/VMware.
Download and install Kali Linux and Metasploitable.
Configure network settings for secure and isolated testing.
Verify connectivity between VMs.
Step-by-Step Guide:
Step 1: Install Virtual Box or VMware
Virtual Box:
Download Virtual Box:
Go to the Virtual Box website.
Download the appropriate version for your operating system (Windows, mac OS, or
Linux).
Install Virtual Box:
Run the downloaded installer
Follow the on-screen instructions to complete the installation
Check if application is installed/ready
Step 2: Download and install machines (Install kali Linux)
Go to the Kali Linux website:
Navigate to the "Downloads" section.
Download the appropriate ISO image for your system (64-bit or 32-bit). (Or)
As Beginners it is best to use pre built machine which is easy to use
Download machine for virtual box
Step 3: Download Metasploitable ISO
Go to the Metasploitable download page:
Step 4: Set Up Kali Linux in Virtual Box/VMware
Open Virtual Box and Add a machine:
GUI of Virtual Box
Click on ‘Add’ (Note: Make sure you have Unzipped the Kali-linux file)
Navigate to your specefic folder and select your machine from the extracted and click
‘Open’
Step 5: Set Up Metasploitable in Virtual Box/VMware
Open Virtual Box and create a new virtual machine
Click "New." (Note: Make sure you have extracted the file)
Click on ‘Expert Mode’ before giving assigning the machine name
Name the VM (e.g., "Metasploitable"), and select "Linux" and "Ubuntu (64-bit).
Assign all the details given as shown below(name can be customized)
Click on ‘Hardware’ tab
Select ‘Use Existing Virtual Had Disk File’ and Click on ‘Add’ and select file
Click on finish to create new machine.
Step 6: Configure Network Settings
Set up network: Assign VMs to the host-only network:
In Virtual Box, select each VM, go to "Settings" > "Network," and attach the VM
to the host-only network.
Note: (Best if Bridged Adapter is selected as)
‘Bridged adapter’ allows you to perform activities on a on connected network
unlike ‘host-only adapter’ which is among VMs
Step 7: Verify Connectivity
Start both VMs (Kali Linux and Metasploitable).
(Note: As we are using prebuilt machines. They have pre-set password and
username
o Kali – ‘kali’ is the user name and password for kali linux
o Metasploitable – ‘msfadmin’ is user name and password
Open a terminal in Kali Linux:
o Ping the Metasploitable IP address to verify connectivity.
o Example: ping 192.168.56.102 (replace with the actual IP address of
Metasploitable).