███╗ ███╗ ██████╗ ██╗ ██╗██╗███╗ ██╗ ██████╗ ███╗ ███╗ █████╗ ██████╗ ██╗ ██╗
████╗ ████║██╔═══██╗██║ ██║██║████╗ ██║██╔════╝ ████╗ ████║██╔══██╗██╔══██╗██║ ██║
██╔████╔██║██║ ██║██║ ██║██║██╔██╗ ██║██║ ███╗██╔████╔██║███████║██████╔╝██║ ██║
██║╚██╔╝██║██║ ██║╚██╗ ██╔╝██║██║╚██╗██║██║ ██║██║╚██╔╝██║██╔══██║██╔══██╗╚██╗ ██╔╝
██║ ╚═╝ ██║╚██████╔╝ ╚████╔╝ ██║██║ ╚████║╚██████╔╝██║ ╚═╝ ██║██║ ██║██║ ██║ ╚████╔╝
╚═╝ ╚═╝ ╚═════╝ ╚═══╝ ╚═╝╚═╝ ╚═══╝ ╚═════╝ ╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝ ╚═══╝
Test Enviroment via Virtual Machine for Sec+ | German | English
Secure virtualized lab environment for cybersecurity training and controlled malware analysis using Microsoft Hyper-V.
This project documents the design and implementation of an isolated Kali Linux lab environment on Windows 11 Pro.
It is built for:
- Malware analysis
- Network traffic inspection
- Digital forensics exercises
- Security testing practice
- CompTIA Security+ preparation
Host:
- Windows 11 Pro
- Hyper-V (Type-1 Hypervisor)
Guest:
- Kali Linux (Generation 2 VM)
- VHDX disk image
Isolation Strategy:
- Private Virtual Switch (default)
- No shared folders
- No clipboard integration
- No USB passthrough
- Checkpoint-based rollback
The lab mitigates:
- Malware escape into home network
- Host compromise via shared resources
- Persistence of malicious artifacts
- Accidental lateral movement
Note: Virtualization provides strong isolation, but misconfiguration increases risk.
- Network isolation by default
- Temporary network activation only when required
- Offline analysis after download
- Mandatory checkpoint before testing
- No host-guest resource sharing
Detailed setup instructions:
This lab is intended strictly for:
- Cybersecurity training
- Certification preparation
- Defensive research
- Controlled lab testing
Not for unauthorized or illegal activities.
MIT License
