Building an ethichal hacking lab on your laptop with VirtualBox – Part 13 – All the Windows

Next install the following operating systems below which I am not going to go through here as the installation guides can easily be found online in either readable or video form and I imagine most of you have configured Windows systems at some point. If not go with the defaults of just next, next, next etc as that’s what most people are going to do anyway!:

Windows Server 2008 R2Configure Active Directory, DNS and DHCP
Windows Server 2012Install, Configure Active Directory, DNS and DHCP
Windows 7
Windows 8
Windows XP

You won’t need to run all of these systems at the same time but try to run them with as much memory as possible, I recommend 2GB’s for XP, 7 and 8 even though they will operate with 1GB albeit much slower and 3-4GB’s for the 2008 R2 server and 2012 server.

And that’s it! For now at least, I am teaching myself Python currently so I can work on some side projects.

You now have a lab on either a laptop, server or PC that will allow you to exploit and investigate what has happened in a safe environment with or without access to the Internet. Stay tuned for future tutorials in which we will exploit and analyse within our sandboxed environment. I encourage you to play around with the environment once you have these operating systems installed and see what you can do! I also encourage you to install other operating systems and tools too and not to stick to the few that have been included in this lab, let me know if you find any vulnerable systems you personally find useful and I may include them in a future lesson.

Remember one thing though about all this, keep the network cards internal especially when running exploits as you don’t want to scan a subnet online or send exploits to something you are not authorised to because you will get in trouble for doing so. You have been warned so go have some fun and learn!


One thought on “Building an ethichal hacking lab on your laptop with VirtualBox – Part 13 – All the Windows

  1. Pingback: DNS Spoofing |

Leave a Reply