Cybersecurity Labs: Home

dz-kali #penetration-testing #security-assessment

In the last post, we installed and configured Windows Server 2022 Evaluation Edition and laid the foundation for the domain controller. In this post, we will import a pre-built virtual machine of Kali Linux and tweak it. Kali Linux is an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking, and network security assessment.

Virtual Machine Settings

Virtual Machine Settings


  • Name: dz-kali
  • Type: Linux
  • Version: Debian (64 bit)
  • Snapshot Folder: /home/devendrashirbad/virtualbox-vms/dz-kali/Snapshots
  • Shared Clipboard: Bidirectional


  • Base Memory: 2048 MB
  • Processors: 1 CPU


  • Hard Disk: 80 GB (/home/devendrashirbad/virtualbox-vms/dz-kali/dz-kali.vdi)
  • Optical Drive: Empty


Adapter 1
  • Host-Only Adapter: vboxnet0
Adapter 2 (Emergency Only)
  • Bridged Adapter: enp3s0

Shared Folder

  • Folder Path: /home/devendrashirbad/cs-lab
  • Folder Name: cs-lab
  • Mount Point: /mnt/cs-lab (auto-mount)

Guest Additions

The Guest Additions are designed to be installed inside a virtual machine after the guest operating system has been installed. They consist of device drivers and system applications that optimize the guest operating system for better performance and usability.

kali@kali:~$ sudo apt update
kali@kali:~$ sudo apt install -y --reinstall virtualbox-guest-x11
kali@kali:~$ sudo reboot -f

Post Installation

  • Rename the hostname to ‘dz-kali’.
  • Change the IP address to ‘’.
└─$ ip a
2: eth0:  mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 08:00:27:1e:36:4a brd ff:ff:ff:ff:ff:ff
    inet brd scope global noprefixroute eth0
       valid_lft forever preferred_lft forever
    inet6 fe80::fca5:cdd8:f0f0:3333/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever

Kali Tools

Kali Linux includes security tools, such as Aircrack-ng, Autopsy, Armitage, Burp Suite, BeEF, Cisco Global Exploiter, Ettercap, Foremost, Hydra, Hashcat, John the Ripper, Kismet, Lynis, Maltego, Metasploit framework, Nmap, Nikto, OWASP ZAP, Reverse engineering toolkit, Social engineering tools, Sqlmap, Volatility, VulnHub, Wireshark, WPScan etc. These tools can be used for many purposes, most of which involve exploiting a victim network or application, performing network discovery, or scanning a target IP address.

Final Outcome

Final Outcome


Scroll to Top
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.