Setting Up A Virtual Machine Hacking Lab: Difference between revisions

From Chalphy Cyber Cavaliers
(Created page with "Virtual Machines form the backbone of AWS and many other services in the industry, but that is not the point of this article. The point of this article is to help you set up a method for you to play around with hacking into things. You will need enough ram to run bo")
 
No edit summary
Line 1: Line 1:
Virtual Machines form the backbone of AWS and many other services in the industry, but that is not the point of this article. The point of this article is to help you set up a method for you to play around with hacking into things. You will need enough ram to run bo
Virtual Machines form the backbone of AWS and many other services in the industry, but that is not the point of this article. The point of this article is to help you set up a method for you to play around with hacking into things. You will need enough ram to run 2 machines at once if you're gonna do this. Without further ado, let's get started.
 
==Installing Virtualbox and Getting Your Machines==
 
Virtualbox is the software we'll be doing this with. It can be downloaded [https://download.virtualbox.org/virtualbox/7.0.14/VirtualBox-7.0.14-161095-Win.exe here]. Run the program and install Virtualbox.
 
We'll need a pre-built virtual machine for both an attacker and a defender. You have options for both these things.
 
Some prominent hacking distributions of Linux that you can use for your hacking lab are:
*[https://cdimage.kali.org/kali-2024.1/kali-linux-2024.1-virtualbox-amd64.7z Kali]
*[https://deb.parrot.sh/parrot/iso/5.3/Parrot-security-5.3_amd64.ova Parrot Security]
*[https://ftp.halifax.rwth-aachen.de/blackarch/ova/blackarch-linux-2023.04.01.ova Blackarch]

Revision as of 22:50, 14 March 2024

Virtual Machines form the backbone of AWS and many other services in the industry, but that is not the point of this article. The point of this article is to help you set up a method for you to play around with hacking into things. You will need enough ram to run 2 machines at once if you're gonna do this. Without further ado, let's get started.

Installing Virtualbox and Getting Your Machines

Virtualbox is the software we'll be doing this with. It can be downloaded here. Run the program and install Virtualbox.

We'll need a pre-built virtual machine for both an attacker and a defender. You have options for both these things.

Some prominent hacking distributions of Linux that you can use for your hacking lab are: