CYB-362 Lab 1: Establishing a VM Lab for Cybersecurity Testing

Verified

Added on  2022/09/09

|35
|2571
|18
Practical Assignment
AI Summary
This assignment details the process of creating a virtual machine (VM) lab environment for cybersecurity purposes. The student begins by downloading and installing VirtualBox, followed by the installation of Kali Linux and Windows operating systems as VMs within VirtualBox. The lab setup includes configuring a host-only network to enable communication between the VMs. The student then installs guest additions and explores network connectivity through ping tests and the use of Nmap for network scanning. The assignment also covers setting up and accessing an Apache web server within the Kali Linux environment and utilizing Netcat for network utility. The student demonstrates understanding of the installation processes, network configuration, and the functionality of essential security tools within the virtualized environment. The document provides screenshots and detailed explanations of each step, concluding with a discussion of the challenges faced and the knowledge gained throughout the lab exercise.
Document Page
Running head: Information System Threats, Attacks and Defences
Information System Threats, Attacks and Defences
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Information System Threats, Attacks and Defences 1
Table of Contents
Introduction:...............................................................................................................................2
Procedure:..................................................................................................................................2
Discussion:...............................................................................................................................32
Conclusion:..............................................................................................................................33
Bibliography:............................................................................................................................34
Document Page
2Information System Threats, Attacks and Defences
Introduction:
The purpose of this paper is discuss about the establishing connection between kali
Linux and windows operating system. For doing the Lab procedure I have chosen oracle
virtual box. It is a free and open source hosted hyper visor for the x86 visualization. The tool
is developed by Oracle Corporation. It supports management and creation of guest virtual
machines such as Windows, Linux, BSD, OS/2, Solaris, Haiku, and OSx86. For the task I
will create 2 vms in virtual box. One is kali Linux and the other one is windows. Both the
system will be installed as host only network.
Procedure:
Question 1:
Downloading VMware virtual machine for windows from:
https://www.oracle.com/virtualization/technologies/vm/downloads/virtualbox-
downloads.html
File downloaded:
Installing virtual box:
Document Page
3Information System Threats, Attacks and Defences
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4Information System Threats, Attacks and Defences
Document Page
5Information System Threats, Attacks and Defences
Installation complete:
Document Page
6Information System Threats, Attacks and Defences
Question 2:
Downloading kali Linux from https://www.kali.org/downloads/
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7Information System Threats, Attacks and Defences
64 bit kali iso downloaded:
Question 3:
Creating kali vm in virtual box:
Document Page
8Information System Threats, Attacks and Defences
Ram setting:
Creating virtual disk:
Document Page
9Information System Threats, Attacks and Defences
Selecting hard disk type:
Storage type in hard disk:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10Information System Threats, Attacks and Defences
Hard disk size:
Selecting ISO file:
Document Page
11Information System Threats, Attacks and Defences
Kali vm created:
Host only adapter:
chevron_up_icon
1 out of 35
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]