Virtualization creates a safe sandbox for you to experiment with the various security tools that will be utilized within the course.
Using VirtualBox or similar desktop virtualization software, create an out of band PEN testing environment that will include an attack platform and numerous target operating systems.
Download a Kali ISO. Refer to the Kali Linux website located within the course materials.
Install Kali Linux in a new virtual machine (use default settings).
Select at least two vulnerable target operation systems from the Vulnhub website located within the course materials.
- Suggest OSs; Metasploitable 1 and Metasploitable 2
- Windows XP Service Pack 0 and Windows 7 Service Pack 0
All virtual machines should be configured on an isolated subnet in VirtualBox, or similar desktop virtualization software settings.
As you go, take instructional notes and screenshots that will help to reproduce your process.
Document the installation process in the “Lab Report Template.” Include individual IP addresses and Host names for each virtual machine.
http://www.vulnhub.com