In this section, we are going to assemble all the pieces to have our fully operational penetration testing lab.
First, download Oracle VM VirtualBox from its official website: www.virtualbox.org.
Once you've downloaded Oracle VM VirtualBox, complete the installation process and leave all the options as default. Once the installation is successful, you will be presented with the following window:
As mentioned, there are many available vulnerable systems that can be found on the internet. We are going to deploy Metasploitable and OWASP Broken Web Applications Project – both of these are virtual machines designed to give students and professionals a real-world, hands-on experience.
Metasploitable 2 is currently available at its official repository at https://information.rapid7...