- I
don't want any newcomer start learning ethical hacking , penetration
testing by exploiting the real targets ( eg corporate network , or
college network ) . I want you to play safe .
- With
this kept in mind today i decided to create our own hacking labs , so
each of you learn real ethical hacking in real ethical manner without
broken any cyber law .
- So our first HACKING LAB is simple , we only use 2 OS i.e KALI LINUX and METASPLOITABLE .
KALI LINUX
- I hope you all know about KALI LINUX , if not then go to KALI website :
- Website link : http://www.kali.org/
- Download your kali linux if you are downloaded yet .
|
KALI LINUX |
METASPLOITABLE
|
METASPLOITABLE |
SOFTWARE REQUIREMENTS
- Oracle Virtual Box
- Operating System : Kali Linux & Metasploitable
- Laptop or Desktop
After all your requirements fullfilled time to setup a lab .
SETTING UP A LAB
Settings of Kali Linux
- While setting up a hacking lab , remember few things -
- Select Network adapter as : Host only adapter .
- Rest of the installation is normal .
- See the below image for more help -
|
KALI LINUX SETTINGS |
Settings of Metasploitable
- RAM : 512
- Network : Host-only adapter
- See the below image for more details of setting -
|
METASPLOITABLE SETTINGS |
Once you are done with settings , start both of your systems .
DESKTOP VIEWS
KALI LINUX
- I am loving it , KALI LINUX desktop view with its ip address 192.168.56.101.
- See the below image for more details -
|
KALI LINUX DESKTOP VIEW WITH IP ADDRESS |
METASPLOITABLE
- Metasploitable ( vulnerable virtual machine )
- Ip Address : 192.168.56.102
- See the below image for more details -
|
METASPLOITABLE DESKTOP WITH ITS IP ADDRESS |
So our hacking lab 01 is ready . Now are you ready to test your penetration testing skills .
Lets start with the simple scanning through KALI LINUX .
Nmap
- Perform a tcp connect scan .
- See the below image for the results
|
NMAP SCANNING |
- Wow !!! so many ports are open .
- Now explore www.abiadonis.blogspot.com once
again , perform different command , use msfconsole to exploit the
vulnerabilities . Also try to learn how to access metasploitable through
telnet .
- There are so many things you can do . Go through every tutorial of www.abiadonis.blogspot.com and learn from it .
I
LEAVE THIS TUTORIAL HERE ,WANT YOU TO PARTICIPATE IN THIS TUTORIAL AND
POST YOUR EXAMPLE SCREENSHOTS ON FACEBOOK .WAITING FOR YOUR SCREENSHOTS .
- REMEMBER : Self learning , practising help you to understand the subject .
- Post your examples screenshots on facebook Abi DA Adonis page and I upload it in this tutorial with your name .
- Keep following because lots of new tutorials still to come . Keep following us . Happy hacking .
Comments