Summary
In this chapter, we began by understanding how to structure a virtual hacking lab and the role of virtualization. We then looked at how to set up and configure our hypervisor and a custom isolated network that could be used to interconnect our virtual machines. Later in the chapter, we set up our target virtual machines on VirtualBox and configured them to use our custom virtual network. We then ended the chapter by deploying Kali Linux in our virtual hacking lab.
Now that we have a functional virtual hacking lab, we can move on to the initial exploitation progress.
In the next chapter, we will begin the privilege escalation process by gaining our initial foothold on our target virtual machines. We will take a look at the various attack vectors that can be leveraged to give us access to the systems.