Technical requirements
To follow along with the exercises in this chapter, please ensure that you have met the following hardware and software requirements:
- Oracle VM VirtualBox – https://www.virtualbox.org/wiki/Downloads
- Oracle VM VirtualBox Extension Pack – https://www.virtualbox.org/wiki/Downloads
- Kali Linux – https://www.kali.org/get-kali/
- Vagrant – https://www.vagrantup.com/
- The Open Web Application Security Project (OWASP) Juice Shop – https://owasp.org/www-project-juice-shop/
- Metasploitable 2 (Linux) – https://sourceforge.net/projects/metasploitable/files/Metasploitable2/
- Metasploitable 3 (Windows and Linux) – https://app.vagrantup.com/rapid7
We’ll be covering the process of setting up Kali Linux, Vagrant, the OWASP Juice Shop, and Metasploitable 2 and 3 in detail in the chapter.
Note
During the installation of Oracle VirtualBox, it’s important to ensure the application is installed within the default location of your C:
drive. In addition to that, please ensure you are using default settings during the installation process or else you may encounter issues.
Additionally, the technical setup of this lab is specifically designed to operate on Windows systems. Please be advised that this setup may not be compatible with Linux or macOS environments.
For Ubuntu users, please refer to the appendix chapter for instructions on setting up VirtualBox, creating virtual networks, deploying Kali Linux, and setting up Metasploitable 3 virtual machines on a Ubuntu Desktop operating system.