1SETTING UP

A journey of a thousand miles begins with a single step.

–Lao Tzu

image

Welcome to the first step in your hacking journey. In this chapter, we’ll set up your lab environment, which will consist of five virtual machines:

A pfSense Virtual Machine An open source router/firewall to protect the vulnerable virtual machines from outside hackers.

A Kali Linux Virtual Machine The machine that contains the hacking tools discussed in this book.

Two Ubuntu Linux Desktop Virtual Machines Machines that we’ll use to demonstrate attacks on desktop/laptop environments.

A Metasploitable Virtual Machine The machine that we’ll use to demonstrate attacks on ...

Get Ethical Hacking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.