Let’s start by setting up the virtual network, then the Nebula VM, and then finally our Kali VM. So now that we’ve got our virtualization software and required ISOs, how do we set up for this scenario? This group is pretty simple – we’ve just got a Kali VM and the Nebula VM behind a host-only network. For a primer on virtualization, click HERE. I personally recommend Virtualbox, since that’s what I’m used to using and it is free. We’ll also need either Virtualbox or a paid copy of VMWare – this is your choice. If you have less RAM than that, choose 32-bit. Just make sure to grab the correct architecture for your computer – if you’re able to run more than 4 GB of RAM, choose 64-bit. I also recommend snagging a copy of the Kali Linux ISO even though it’s not completely necessary for all of the challenges, it will play a role in some. This will give you the ISO needed to run Nebula. To start, download Nebula from the Google drive here. If you’re new to the world of challenge VMs, not to worry – they’re a great way to practice pentesting locally, so that there’s no legal issues! The Nebula series of challenges are done locally on your computer and are based around service misconfigurations and logical errors rather than kernel exploits and reverse shells. Hey everyone! Today we’ll be taking a look at Exploit-Exercises’ Nebula challenge VM and getting it set up for some attacking down the line.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |