Want to keep learning?

This content is taken from the Coventry University & Institute of Coding's online course, Ethical Hacking: An Introduction. Join the course to learn more.

Setting up a virtual lab

In order to complete the practical lab that takes place later this week, you’ll need to download and configure the virtual machines (VMs) from our repository. This step contains instructions on how to set up your first local virtual lab.

Please read the following information carefully

In order to complete the virtual labs you will need a PC capable of running Virtual Machines (VMs). We recommend at least a dual core CPU with Intel’s vt-x or AMD-V enabled (sometimes these features require a BIOS setting to activate in same laptops). You will also need a minimum of 8GB of memory and about 60GB of free hard disk space to store the VMs.

To run the virtual machine, you’ll first need to download and install one of the following:

These are free for non-commercial educational use. Just follow the appropriate link above and select ‘download now’.

Your task

You now need to download two VMs from our repository:

  • CUEHaliLight
  • COSserver

Once you’ve downloaded the VMs, extract the archive and double click on the VMware virtual machine (.vmx) file, which will open the VM in VMware Player/Fusion.

Important: When you run the VM for the first time, VMware will ask you whether you have copied the VM or moved it. You must select ‘Moved’.

The first VM you will use is CUEHaliLight. This is a customised version of Kali Linux which has everything you need for this course and has been configured to work with the other VMs from our virtual lab.

Once the Kali VM has booted, you can log in using:

  • Username: root
  • Password: toor

Credentials for COSserver are:

  • Username: root
  • Password: qwe123!

You should now be ready for the practical exercise that will take place later in the week, but first, let’s look at penetration testing and explore some of the legal frameworks that need to be considered in ethical hacking.

Share this article:

This article is from the free online course:

Ethical Hacking: An Introduction

Coventry University