Lab Setup
Home Lab Environment Configuration
Host Specifications
| Component | Specification |
|---|---|
| Operating System | Arch Linux |
| CPU | Intel i7-13700HX |
| RAM | 15GB |
| GPU | NVIDIA RTX 4060 |
| Virtualization | KVM/QEMU |
Virtual Machines
| VM Name | Role | OS |
|---|---|---|
| Kali | Attacker | Kali Linux |
| Metasploitable 2 | Victim 1 | Ubuntu 8.04 (Hardened) |
| Ubuntu Server 22.04 | Victim 2 | Ubuntu Server 22.04 LTS |
Network Configuration
The lab uses an isolated virtual bridge network for security and isolation:
- Bridge: virbr1
- Subnet: 192.168.100.0/24
- Type: Isolated (no external internet access)
Network Topology
Purpose
This isolated lab environment allows for safe penetration testing and vulnerability assessment without risk to production systems or external networks. All attacks are contained within the virtual network.