This project demonstrates the complete setup of a basic penetration testing cybersecurity lab using virtual machines. The lab provides a safe and controlled environment for practicing ethical hacking, network scanning, and vulnerability analysis.
The main objective of this project is to:
- Build a secure virtual penetration testing lab
- Understand real-world cyberattack simulation
- Practice ethical hacking techniques
- Learn network scanning and system exploitation
- Improve hands-on cybersecurity skills
| Component | Description |
|---|---|
| Host OS | Windows 10 |
| Attacker Machine | Kali Linux |
| Target Machine | Metasploitable 2 |
| Virtualization Software | VMware Workstation |
| Network Type | NAT / Host-Only |
| Purpose | Ethical Hacking & Security Testing |
- Minimum 8 GB RAM
- Minimum 60 GB Free Disk Space
- Intel / AMD Virtualization Enabled in BIOS
- Stable Internet Connection
- Windows 10 / 11 Host System
- VMware Workstation Pro
- Kali Linux ISO
- Metasploitable 2 Virtual Machine
- Nmap
- Metasploit Framework
Download and install VMware Workstation Pro on your Windows host system.
Download:
- Kali Linux ISO
- Metasploitable 2 VM Image
- Create a new VM for Kali Linux
- Import the Metasploitable 2 VM into VMware
Set both VMs to the same network mode:
- NAT (Recommended)
- OR Host-Only
This enables internal communication between machines.
Start:
- Kali Linux
- Metasploitable 2
ipconfig
ping 192.168.152.10
ping 192.168.152.20
Username: msfadmin
Password: msfadmin
ifconfig
nmap 192.168.152.20