...

Cybersecurity Labs: Home

Dz-Win10 #Vulnerable

In this post, we will install and configure Windows 10 Evaluation Edition and make it vulnerable.

Virtual Machine Settings

Virtual Machine Settings

General

  • Basic
    • Name: dz-win10
    • Type: Microsoft Windows
    • Version: Windows 10 (64 bit)
  • Advanced
    • Snapshot Folder: /home/devendrashirbad/virtualbox-vms/dz-win10/Snapshots
    • Shared Clipboard: Bidirectional

System

  • MotherBoard
    • Base Memory: 4096 MB (try 2048 MB, sacrifice performance)
  • Processor
    • Processors: 2 CPU (try 1 CPU, sacrifice performance)

Storage

  • Hard Disk: 50 GB (/home/devendrashirbad/virtualbox-vms/dz-win10/dz-win10.vdi)
  • Optical Drive: /home/devendrashirbad/cs-lab/windows-10-evaluation-x64.iso

Network

  • Adapter 1
    • Host-Only Adapter: vboxnet0
  • Adapter 2 (Emergency Only)
    • Bridged Adapter: enp3s0

Shared Folder

  • Folder Path: /home/devendrashirbad/cs-lab
  • Folder Name: cs-lab
  • Mount Point: z: (auto-mount)

Guest Additions

The Guest Additions are designed to be installed inside a virtual machine after the guest operating system has been installed. They consist of device drivers and system applications that optimize the guest operating system for better performance and usability.

Post Installation

  • Rename the hostname to ‘dz-win10’.
  • Change the IP address to ‘192.168.56.213’.
C:\Users\Devendrakumar>ipconfig

Windows IP Configuration


Ethernet adapter Ethernet:

   Connection-specific DNS Suffix  . :
   Link-local IPv6 Address . . . . . : fe80::88c3:9024:7fb6:d7d2%5
   IPv4 Address. . . . . . . . . . . : 192.168.56.213
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.56.1

⚠️ Make It Vulnerable

This system will act as a victim so we intentionally disable the security settings and make it vulnerable. You never do it in the PROD systems.

  • Disable Virus and Threat Protection in Windows Security
    • Real Time Protection
    • Cloud Deliver Protection
    • Automatic Sample Submission
    • Tamper Protection
  • Disable Firewall
    • Domain
    • Private
    • Public

Install And Configure IIS Server

We might need the IIS (Internet Information Services) server for hosting our web application (maybe with malware) for penetration testing. It’s optional at the moment, we can do it any time in the future.

  • Turn Windows feature on or off.
  • Enable Internet Information Services.
  • Create an index page at the IIS root ‘C:\inetpub\wwwroot\index.htm’.
 Welcome to Cybersecurity Labs!!! 
  • Launch a web browser and explore ‘http://localhost’. Did you notice the welcome message?
  • Confirm that the IIS is installed and running (windows services, task manager etc).
IIS Server

Final Outcome

Final Outcome

Downloads

Scroll to Top
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.