Lab Setup

Home Lab Environment Configuration

Host Specifications

Component Specification
Operating System Arch Linux
CPU Intel i7-13700HX
RAM 15GB
GPU NVIDIA RTX 4060
Virtualization KVM/QEMU

Virtual Machines

VM Name Role OS
Kali Attacker Kali Linux
Metasploitable 2 Victim 1 Ubuntu 8.04 (Hardened)
Ubuntu Server 22.04 Victim 2 Ubuntu Server 22.04 LTS

Network Configuration

The lab uses an isolated virtual bridge network for security and isolation:

Network Topology

virbr1 192.168.100.0/24 Isolated Bridge Kali Attacker 192.168.100.10 Metasploitable 2 Victim 1 192.168.100.20 Ubuntu Server Victim 2 192.168.100.30

Purpose

This isolated lab environment allows for safe penetration testing and vulnerability assessment without risk to production systems or external networks. All attacks are contained within the virtual network.