Appendix
Setting Up a Penetration Testing Lab on Ubuntu Desktop
In this chapter, you will learn how to design and build a virtualized penetration testing lab environment on an Ubuntu Desktop computer and leverage virtualization technologies to reduce the cost and need to acquire multiple physical systems and devices.
In addition, you’ll learn how to set up virtually isolated networks to ensure you do not accidentally target systems you do not own. Furthermore, you will set up Kali Linux as the attacker machine and Metasploitable 3 as a vulnerable system for your targets. It’s important to always remember that when practicing offensive security skills such as ethical hacking and penetration testing, it should always be performed on systems and ...
Get The Ultimate Kali Linux Book - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.