Setup Guide
1. Virtual Machine Setup + Ubuntu + Other Necessary Setup
https://www.youtube.com/watch?v=nvdnQX9UkMY
2. Kali Linux Setup (Skip the virtual Machine Setup part)
https://www.youtube.com/watch?v=ZJFu0AoAY_g
3. Metasploitable 2
https://www.youtube.com/watch?v=l8v65ePR44k
4. Configure Networking for VM Communication
https://www.youtube.com/watch?v=DzmUOeFdc-w
Deliverables
1. Virtual Environment Setup Document
o Step-by-step text of what you did (you can copy from this guide).
o Add screenshots:
▪ VirtualBox installed.
▪ Kali running.
▪ Metasploitable running.
▪ Ubuntu running.
▪ Successful ping tests between VMs.
2. Video (~40 minutes) — each team member must show:
o Installing and opening VirtualBox.
o Setting up Kali, Metasploitable2, Ubuntu VMs.
o Showing each VM booted and running.
o Showing network configuration.
o Demonstrating ping between VMs (proof of network communication).
Full Step-by-Step Guide — Virtual Environment Setup
🗂️ 1️⃣ Install Oracle VirtualBox
➤ Steps:
1. Go to official website: https://www.virtualbox.org/wiki/Downloads
2. Download the latest version of VirtualBox for your OS (Windows, Mac, Linux).
3. Install VirtualBox using default settings.
4. After installation, launch VirtualBox.
Take Screenshot of VirtualBox opened → For Installation Verification
Optional: Install VirtualBox Extension Pack from same page (enables USB 2.0/3.0 and other
features).
🗂️ 2️⃣ Download and Set Up VMs
a) Kali Linux VM (Attacker)
1. Go to: https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-
download/
2. Download Kali Linux VirtualBox image (.OVA file).
3. Import Kali VM:
o Open VirtualBox → File → Import Appliance → Select the .ova file → Next →
Import.
4. Start Kali Linux VM.
5. Verify login (Default credentials: kali / kali).
Screenshot: Kali VM running.
b) Metasploitable 2 VM (Victim)
1. Go to: https://sourceforge.net/projects/metasploitable/files/Metasploitable2/
2. Download Metasploitable2-Linux.zip.
3. Extract the .zip file.
4. In VirtualBox:
o Click New → Name: Metasploitable2 → Type: Linux → Version: Ubuntu (32-
bit).
o Attach the .vmdk disk provided (Settings → Storage → Add existing disk).
5. Start Metasploitable2 VM.
6. Verify login (Default: msfadmin / msfadmin).
Screenshot: Metasploitable2 running.
c) Ubuntu VM (Defensive Host)
1. Go to: https://ubuntu.com/download/desktop
2. Download the latest Ubuntu Desktop ISO.
3. In VirtualBox:
o Click New → Name: Ubuntu → Type: Linux → Version: Ubuntu (64-bit).
o Assign at least 2 GB RAM, 2 CPUs, and 20 GB disk space.
o Attach the Ubuntu ISO in Settings → Storage → Optical Drive.
4. Start the VM and Install Ubuntu Desktop.
5. Complete installation and restart.
6. Login to Ubuntu.
Screenshot: Ubuntu running.
🗂️ 3️⃣ Configure Networking for VM Communication
Goal: All VMs can talk to each other (ping each other).
Option 1 — Host-only Adapter + NAT
• NAT for internet access
• Host-only Adapter for VM-to-VM communication.
Option 2 — Internal Network (simpler for isolated lab)
• All VMs on the same Internal Network → No internet, safe lab.
Steps:
1. In VirtualBox → Settings → Network:
o Adapter 1 → Enable Network Adapter
o Attached to → Internal Network
(name it LabNet or any name you like).
2. Apply this to:
o Kali Linux VM
o Metasploitable 2 VM
o Ubuntu VM
3. Start all VMs.
4. Inside each VM → Find IP address:
o Kali: ip addr show or ifconfig
o Ubuntu: ip addr show or ifconfig
o Metasploitable2: ifconfig
5. Test communication:
o From Kali → ping Metasploitable2
o From Kali → ping Ubuntu
o From Ubuntu → ping Kali and Metasploitable2
Screenshots of successful ping tests (showing that all VMs can talk).