we love to test new digital tools and security systems with you, maddy and creating our own home safe tech lab in a secondary separated computer for this purpose
u didnt even connect these machines 😐
Looks like a lot of people in the comments are confused. She did a barebones setup just to get you started like she stated, it's not a full blown tutorial. You still have to configure the virtual network switches & adapters in your hypervisor whether it's VirtualBox, VMware Workstation, Hyper-V, Proxmox, etc. Just put the VMs on the same (virtual) network switch to start so they can easily talk to each other, then dive deeper into the vast Kali tools like nikto, metasploit, dnsmap, nmap, etc. and just start messing around seeing what damage you can do to the VM - it's not an exact science or something that can be taught quickly, just mess around and build up skills over time, and familiarize yourself with the tools
I WANTED THE IP THING WHERE YOU CONNECT THEM TOGETHER
great vid, you have a very calming voice. Very easy to follow along. Gracias for the vid.
uh.. as much as i enjoy your videos.. you literally just installed two virtual OS and.. that's that?
Maybe its not a homelab like you see on other homelab videos, but i think the idea is to get the start idea in homelabing if you dont know or you are not sure on how to get started with homelab, in the super basic homelab satrt point.Thank you for the info
Happy New Years Maddy! 🙌🎉
Where's the network configuration? This isn't a lab set up video, it's barely a 'how to install virtual machines' video.
love the video thank you for doing it. show us some projects using this set up?
Happy New Years Maddy!
9:09 kirby
Chocolate!!!!!!! Chocolate!!! That was nostalgic. 😂
A cute hacker, nice. A good beginner video.
did you really make a video about installing os on a virtual machine and called it beginner penetration testing homelab?
Happy New Years! Thank you for a wonderful channel and I hope life treats you well ❤🎉
Happy New Year!
Have you heard of metasploit virtual machine image? A fellow colleague uses it to ethical hack. From my understanding it basically has no guard rails so you can basically do anything to it.
Metasploitable 2 is my favorite. Theres soooo many vulnerablities in it. Does Windows still have Eternal Blue/Eternal Romance exploits in them — windows xp had one of them?
@GnarCoding