0% found this document useful (0 votes)
52 views5 pages

Lab Exercise - Building A Cybersecurity Lab

The document outlines the steps to build a cybersecurity lab, including the installation of an attacker machine (Kali Linux) and a victim machine (Metasploitable) using Oracle VirtualBox. It details the necessary resources, installation procedures, and network configuration for connecting the virtual machines. The guide emphasizes setting up the network interfaces and assigning IP addresses for successful communication between the VMs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views5 pages

Lab Exercise - Building A Cybersecurity Lab

The document outlines the steps to build a cybersecurity lab, including the installation of an attacker machine (Kali Linux) and a victim machine (Metasploitable) using Oracle VirtualBox. It details the necessary resources, installation procedures, and network configuration for connecting the virtual machines. The guide emphasizes setting up the network interfaces and assigning IP addresses for successful communication between the VMs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Building a Cyber security Lab

Objectives

▪ Part A: Installation o f t h e a tt a c k e r m a c h i n e
▪ Part B: Installation of target machine
▪ Part C: Connecting the VMs on VirtualBox

Required Resources

▪ Computer with a minimum of 8 GB of RAM and 50 GB of free disk space


▪ High speed Internet access to download Oracle VirtualBox and the virtual machine
image files

Part A - Installation of attacker machine (Kali Linux))

In Part one, you will download and install desktop virtualization software, and
download an image file that can be used to complete labs throughout the course. For
this lab, the virtual machine is running Linux.

Step 1: Download and install VirtualBox.


a. Navigate to Oracle Virtualbox dowload page
b. Choose and download the appropriate installation file for your operating system.
c. When you have downloaded the VirtualBox installation file, run the installer
and accept the default installation settings.

Step 2: Download and install GNS3.


a. Navigate to Kali Linux Download page h t t p s : / / k a l i . o r g / g e t - k a l i / # k a l i -
platforms
b. Download the VM image for virtual box. https://www.kali.org/get-kali/#kali-virtual-
machines

Step 3: Extract the contents of the zipped folder.

CECR 1003 – Cybersecurity by Design


Step 4: Importing the virtual machine into Virtualbox

▪ Once extracted from zipped folder, You will see two files a VDI (virtual disk
image) which is the virtual harddisk and VMD file which is virtualbox machine
file.
▪ Doubleclick on VMD file. (If virtualbox isn’t the default application, open it with
virtualbox.)
▪ The OS now opens into Virtualbox.

Part B - Installation of victim machine (Metasploitable)

Download and install Metasploitable VM on VirtualBox (similar to installation of Kali Linux


done earlier)

Part C: Connecting the VMs


In this section, we will cover the two ways of connecting the VMs:-

❖ Connecting the VMs direcly on Virtualbox


The VMs mounted on virtualbox can be connected to each other by creating virtual
networks and mapping the VM’s network interface to the network created.

a. Select the virtual machine and click settings.


b. Under System > Network, ensure that adapater 1 and 2 are enabled and cable
connected. Note: On each VM, the first network adapter must be attached to NAT
(for internet) whereas the second adapter must be “internal” (Network name can be
anything.)

CECR 1003 – Cybersecurity by Design


c. Perform the same steps on both VMs
d. Assign an ip address on both VMs (must be in same subnet). This can be
done on CLI or using the GUI settings

Changing IP address on the VMs

Firstly check the network interfaces and current ip address on the VM using ifconfig
command.
On Desktop > Right click > Open
terminal # sudo su
# sudo ifconfig | less
Note: If you get an error, it means ‘net-tools’ package is not installed. Install the
package using the comand ‘apt-get install net-tools’
The first interface is a NAT interface and should have an IP address automatically
assigned whereas the second interface should not have any ip address.

CECR 1003 – Cybersecurity by Design


Assign the ip address on the 2nd (internal) interface on both the VMs using the
command: ifconfig <interface name> <ip address> netmask <subnetmask> up
In the example below we have assigned the two VMs ip addresses 10.10.10.1 &
10.10.10.2 respectively on their respective interfaces enp0s8 and eth1.
Finally test the connectivity using ping.

CECR 1003 – Cybersecurity by Design


CECR 1003 – Cybersecurity by Design

You might also like