You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
The best way to develop ethical hacking skills is through hands-on practice in a safe, legal environment. This lesson covers how to build your own hacking lab, where to find vulnerable machines, and how to progress your cybersecurity career.
Tip: Never practise hacking techniques on systems you do not own or have explicit permission to test. Always use your own lab or authorised platforms.
A typical home lab uses virtualisation to run multiple machines:
┌─────────────────────────────────────────┐
│ Host Machine (Your PC) │
│ │
│ ┌─────────────┐ ┌──────────────────┐ │
│ │ Kali Linux │ │ Vulnerable VMs │ │
│ │ (Attacker) │ │ ┌──────────────┐ │ │
│ │ │ │ │ Metasploitable│ │ │
│ │ Tools: │ │ │ DVWA │ │ │
│ │ - Nmap │ │ │ VulnHub VMs │ │ │
│ │ - Metasploit│ │ │ HackTheBox │ │ │
│ │ - Burp Suite│ │ └──────────────┘ │ │
│ └─────────────┘ └──────────────────┘ │
│ │
│ ┌────────────────────────────────────┐ │
│ │ Internal Virtual Network │ │
│ │ (Host-Only or NAT Network) │ │
│ └────────────────────────────────────┘ │
└─────────────────────────────────────────┘
| Feature | Details |
|---|---|
| Cost | Free and open source |
| Platforms | Windows, macOS, Linux |
| Snapshots | Save and restore VM states |
| Networking | NAT, Host-Only, Internal, Bridged |
| Performance | Good for most lab scenarios |
| Feature | Details |
|---|---|
| Cost | Free (Player) / Paid (Pro) |
| Platforms | Windows (Workstation), macOS (Fusion) |
| Snapshots | Full snapshot trees |
| Performance | Generally faster than VirtualBox |
| Network Type | Use Case | Internet Access |
|---|---|---|
| Host-Only | Isolated lab network (most secure) | No |
| NAT Network | Lab with internet access for updates | Yes (outbound only) |
| Internal | VM-to-VM only communication | No |
| Bridged | VMs on your real network (use cautiously) | Full |
Tip: Use a Host-Only network for your lab to prevent accidental exposure of vulnerable machines to the internet.
Kali Linux is the standard penetration testing distribution:
| Method | Description |
|---|---|
| VM image | Pre-built VirtualBox/VMware images (recommended) |
| ISO install | Full installation from ISO |
| WSL | Windows Subsystem for Linux (limited) |
| Docker | Containerised Kali |
| Live USB | Boot from USB without installation |
| Category | Tools |
|---|---|
| Reconnaissance | Nmap, theHarvester, Recon-ng, Maltego |
| Web testing | Burp Suite, OWASP ZAP, sqlmap, Gobuster |
| Exploitation | Metasploit, SearchSploit, msfvenom |
| Password cracking | Hashcat, John the Ripper, Hydra |
| Wireless | Aircrack-ng, Kismet, Wifite |
| Post-exploitation | Mimikatz, LinPEAS, WinPEAS, Chisel |
| Networking | Wireshark, Bettercap, Responder |
| Forensics | Autopsy, Volatility, binwalk |
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.