Skip to content

A complete virtual penetration testing lab setup using Kali Linux and Metasploitable 2 on VMware for ethical hacking practice, network scanning, and cybersecurity learning in a safe environment.

Notifications You must be signed in to change notification settings

dineshcoder0841/Cybersecurity-Penetration-testing-lab-setup

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🛡️ Penetration Testing Cybersecurity Lab Setup

This project demonstrates the complete setup of a basic penetration testing cybersecurity lab using virtual machines. The lab provides a safe and controlled environment for practicing ethical hacking, network scanning, and vulnerability analysis.


📌 Project Objective

The main objective of this project is to:

  • Build a secure virtual penetration testing lab
  • Understand real-world cyberattack simulation
  • Practice ethical hacking techniques
  • Learn network scanning and system exploitation
  • Improve hands-on cybersecurity skills

🧰 Lab Environment Overview

Component Description
Host OS Windows 10
Attacker Machine Kali Linux
Target Machine Metasploitable 2
Virtualization Software VMware Workstation
Network Type NAT / Host-Only
Purpose Ethical Hacking & Security Testing

🖥️ System Requirements

  • Minimum 8 GB RAM
  • Minimum 60 GB Free Disk Space
  • Intel / AMD Virtualization Enabled in BIOS
  • Stable Internet Connection
  • Windows 10 / 11 Host System

🛠️ Software Used

  • VMware Workstation Pro
  • Kali Linux ISO
  • Metasploitable 2 Virtual Machine
  • Nmap
  • Metasploit Framework

📥 Step-by-Step Lab Setup

✅ Step 1: Install VMware Workstation

Download and install VMware Workstation Pro on your Windows host system.


✅ Step 2: Download Virtual Machines

Download:

  • Kali Linux ISO
  • Metasploitable 2 VM Image

✅ Step 3: Create Virtual Machines

  • Create a new VM for Kali Linux
  • Import the Metasploitable 2 VM into VMware

✅ Step 4: Configure Network

Set both VMs to the same network mode:

  • NAT (Recommended)
  • OR Host-Only

This enables internal communication between machines.


✅ Step 5: Power On the Virtual Machines

Start:

  • Kali Linux
  • Metasploitable 2

🌐 Network Verification

🔹 On Windows Host:

ipconfig
ping 192.168.152.10
ping 192.168.152.20
Username: msfadmin
Password: msfadmin
ifconfig
nmap 192.168.152.20

About

A complete virtual penetration testing lab setup using Kali Linux and Metasploitable 2 on VMware for ethical hacking practice, network scanning, and cybersecurity learning in a safe environment.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published