Setting Up A Virtual Machine Hacking Lab: Difference between revisions

From Chalphy Cyber Cavaliers
No edit summary
No edit summary
Line 11: Line 11:
*[https://deb.parrot.sh/parrot/iso/5.3/Parrot-security-5.3_amd64.ova Parrot Security]
*[https://deb.parrot.sh/parrot/iso/5.3/Parrot-security-5.3_amd64.ova Parrot Security]
*[https://ftp.halifax.rwth-aachen.de/blackarch/ova/blackarch-linux-2023.04.01.ova Blackarch]
*[https://ftp.halifax.rwth-aachen.de/blackarch/ova/blackarch-linux-2023.04.01.ova Blackarch]
For systems to attack, the best one is probably [https://sourceforge.net/projects/metasploitable/files/Metasploitable2/metasploitable-linux-2.0.0.zip/download Metasploitable], because its preloaded with vulnerabilities, but you can always configure your own system to be vulnerable and try to break into it. A good resource if you do this would be STIGs, which are step by step guides of how to harden a system with default settings.
==Setting Up A Network==
Reserved.

Revision as of 23:00, 14 March 2024

Virtual Machines form the backbone of AWS and many other services in the industry, but that is not the point of this article. The point of this article is to help you set up a method for you to play around with hacking into things. You will need enough ram to run 2 machines at once if you're gonna do this. Without further ado, let's get started.

Installing Virtualbox and Getting Your Machines

Virtualbox is the software we'll be doing this with. It can be downloaded here. Run the program and install Virtualbox.

We'll need a pre-built virtual machine for both an attacker and a defender. You have options for both these things.

Some prominent hacking distributions of Linux that you can use for your hacking lab are:

For systems to attack, the best one is probably Metasploitable, because its preloaded with vulnerabilities, but you can always configure your own system to be vulnerable and try to break into it. A good resource if you do this would be STIGs, which are step by step guides of how to harden a system with default settings.

Setting Up A Network

Reserved.