Building Your Own Ethical Hacking Lab involves several steps to ensure you have a safe and effective environment for practising penetration testing.
1. VirtualBox Installation
- This tutorial use Oracle VM VirtualBox, the most popular free and open-source hosted hypervisor for x86 virtualization, developed by Oracle.
- There are other options from different vendors to achieve the same result:
- Make sure your PC support hardware virtualization (Windows)
- Reboot your computer
- Right when the computer is coming up from the black screen, press Delete, Esc, F1, F2, or F4. Each computer manufacturer uses a different key but it may show a brief message at boot telling you which one to press. If you miss it the first time, reboot and try again. It helps to tap the key about twice a second when the computer is coming up. If you are not able to enter the BIOS via this method, consult your computer’s manual.
- In the BIOS settings, find the configuration items related to the CPU. These can be in under the headings Processor, Chipset, or Northbridge.
- Enable virtualization; the setting may be called VT-x, AMD-V, SVM, or Vanderpool. Enable Intel VT-d or AMD IOMMU if the options are available.
- Save your changes and reboot.
Also Read : Learn Pentesting in 5 Minutes
⚠️ If you are unable to find the Virtualization settings in your BIOS it may mean that your computer does not support it.
- Download the latest version of Virtual Box
- Install Virtual Box and Extension Pack
- There is no special configuration on the Virtual Box installation process, just point, click and install.
- Once the installation is done, install the Extension Pack by double clicking it; The file extension is
.vbox-extpack
. Don’t worry about the warning prompts.
VirtualBox NAT configurations
The next steps will cover how to create a NAT network on VirtualBox. In simple words Virtual Machines needs a virtual network adapter, to access the internet and segragete your Host IP(main OS) and Guest IP(VM).
- Launch VirtualBox and open the
Preferences
pane

- Go to the
Network tab
on the left pane, and then click thegreen plus button
on the right

- By the default, VirtualBox automatically creates a NatNetwork. Click the
OK
button and save this configuration

- Next part we will download the latest Kali Linux version and boot it up into Virtual box software
About Kali Linux
⚠️ Kali Linux Tutorial will be covered on the next module [Linux for Hackers].md
Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. [+]
Kali Linux contains several hundred tools targeted towards various information security tasks, such as:
- Penetration Testing
- Security Research
- Computer Forensics
- Reverse Engineering
Download the latest Kali Linux image
- Go to Offensive Security website:
- Download the Kali Linux VirtualBox image, make sure to select the
Virtual Box image (OVA)

2. Installing Kali Linux on VirtualBox
Once you have installed VirtualBox and downloaded the Kali Linux image, you just need to import it to VirtualBox in order to make it work.
- Launch VirtualBox and click the
Import Button
on the top center menu
- Next, browse the Kali Linux image (OVA) you just downloaded and choose it to be imported (as you can see in the image below).
- Next, you will be shown the settings for the virtual machine you are about to import. So, you can customize them or not – that is your choice based on your hardware capacity.
- If you have a computer with 8GB RAM and at least 2 cores available, leave the default settings.
- If your computer have 16GB RAM or more, I recommend to use 4GB RAM on Kali Linux, to do that, scroll down the configuration list and change the
RAM value
to4096
MB

- You will now see the Kali box listed. So, just hit Start to launch it.

- Type the default credentials: username:
kali
, password:kali
.- Tip: On Linux, you can change the default password of the current user by typing
passwd
on terminal.
- Tip: On Linux, you can change the default password of the current user by typing

- Done!
