Home Lab Setup Part 2 of 3
Details
A home lab with no targets is just a fancy VM manager. In Part 2 of the Home Lab Setup series, we get operational — adding your attack machine, standing up your first target, and making sure everything can actually talk to each other.
🎯 What We'll Cover
- Installing and configuring Kali Linux as your attack machine
- Setting up Metasploitable 2 as your first target VM
- Network segmentation
— keeping lab traffic off your home network
- Snapshot strategy
— saving and restoring VM states before and after testing
- Verification: confirming your attacker and target can see each other
🔗 Stay connected:
- Cover6 Solutions: https://www.cover6solutions.com
- YouTube (live streams + replays): https://www.youtube.com/@Cover6Solutions
- Courses and certification prep: https://cover6solutions.com/courses/
🎤 Submit a talk/demo: https://www.papercall.io/cover6community
