Lesson Notes

Setting Up Your Lab

Module 3: Tools of the Trade. Kali VM, add VeraCrypt for encrypted volumes.

Module 3: Setting Up Your Lab — Comprehensive Theory Guide

This lesson covers how to build a safe, repeatable environment for ethical practice. A dedicated lab (Kali VM, isolated network, encrypted storage) lets you run scans, test tools, and learn without affecting real systems. Everything you do must stay within scope: only systems you own or have written permission to test.

Why a Lab Matters

Real networks and systems are off-limits without authorization. A lab gives you a sandbox: you can run Nmap, Burp, Metasploit, and other tools against intentionally vulnerable targets (e.g. Metasploitable, DVWA) or your own VMs. You document your network (IP ranges, hostnames) so recon and scanning are consistent. Isolation (host-only or NAT) prevents lab traffic from leaking to the internet or your main LAN.

Kali Linux VM: Role and Setup

Kali is a Debian-based distribution preloaded with hundreds of security and pentest tools (Nmap, Wireshark, Burp, Metasploit, John, etc.). Install it in VirtualBox or VMware; allocate enough RAM and disk. Use a host-only or internal network so the Kali VM can reach your target VMs but not the wider internet unless you choose to. Keep Kali updated (apt update && apt upgrade) and document the IP it gets (e.g. 192.168.56.101).

VeraCrypt: Encrypted Volumes for Lab Data

Sensitive lab data (credentials, key logs, PCAPs, reports) should be stored encrypted. VeraCrypt lets you create an encrypted file container or encrypt a whole partition/USB. You choose a strong password and optionally a keyfile; without them, the volume is unreadable. Use it for lab notes, evidence, or keys so that if the VM or drive is lost, data remains protected. Create a volume, mount it when needed, and unmount when done.

Safe Targets and Scope

Safe targets include Metasploitable, DVWA, and other intentionally vulnerable images, plus VMs you build yourself. Never scan or attack systems you do not own or have explicit permission to test. Document scope in writing (IP ranges, allowed tests). A repeatable, isolated lab plus encrypted storage is the foundation for professional practice; always scope tests to your lab only.

Key Takeaway for Lesson 15

Set up a Kali VM on an isolated network, add VeraCrypt for encrypted storage of lab data, and document your lab topology. Use only authorized targets. This environment supports all later lessons (Nmap, Burp, exploitation, crypto labs). Next: Nmap port scanning, including SSL/TLS services.