Part 3: Create a Complete Virtual Environment for Penetration Testing

March 18, 2016 | Views: 18703

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Install Mac OS X (Yosemite)


Hello, fellow Cybrarians:

Thank you for your supportive comments and positive feedback. It encouraged me to do more tutorials to benefit this great Community.

Today, we’re going to setup a Mac OS X virtual machine and connect to the Pfsense.


Tutorial Requirements:

Tutorial Guidelines:

  • Downloading the VDMK and extracting it
  • Creating a virtual machine for Mac
  • Configure the settings of  the Mac machine
  • Installing Mac OS
  • Connecting the Mac machine to the Pfsense


First, before we begin, let’s understand some terminology…

–  What is VMDK?   

Virtual Machine Disk is a file format that developed initially for VMWares, but also supports Virtual Box environment. They are many types of virtual disks that can be used in Virtual box:


– All of them support dynamical allocated sizing

– All of them support snapshots


Let’s start…

Step 1: Downloading the VDMK and Extracting it

  • Download the WinRAR file that’s provided in the requirement section and extract it using any preferable extraction tool
  • Once you Extract the file, you should have files that are similar to the below picture




Step 2: Creating a Virtual Machine for Mac





  • Choose the Mac VMDK




Step 3: Configure the Settings of the Mac Machine

  • In the System tab, make sure to uncheck the Enable EFI and Hardware Clock



– EFI: Extensible Firmware Interface, EFI is a new BIOS standard developed by Intel.


– For the System tab above, make sure to uncheck Enable EFI and Hardware Clock

– For the Display tab, Increase the Video Memory to its full capacity of 128MB



  • And for the Network tab, setup the network adapter as Internal to able to connect it later to Pfsense


We’re done with the settings. Let’s start the machine and go through the installation process.

Step 4:  Installing Mac OS

  • Once the virtual machine starts, it would take 3 mins to fully load

  • In the welcome screen, choose Mac OS Yosemite Niresh and click Continue

  • The loading process starts, which usually takes 2-3 minutes and it should take you to the welcome screen


  • Choose the language and click continue

  • 22.JPG

    Click Continue



  • Choose my Computer does not connect to the internet. Click Continue.

  • We’ll deal with the connection later

  • 25.JPG

    Click Continue


  – Create a username and password for your account. Click Continue.


         – It would take few seconds to setup the desktop


    DONE !!


Note: You always use snapshot or clone feature to backup your box to avoid going through the process again if something wrong happens during your pentesting…


Step 5: Connecting the Vbox to the pfsense

  1. Open the PFsense box first and then ping its IP address from the Mac machine. In our first tutorial (PART-1), I set it up as
  2. Ping or any website to check the internet connection.


You should get a reply from both if you followed all the steps.

That’s all for this tutorial. Hope it was useful and stay tuned for more.


Create a Complete Virtual Environment for Penetration Testing – Part 1

Create a Complete Virtual Environment for Penetration Testing – Part 2

Create a Complete Virtual Environment for Penetration Testing – Part 4

Create a Complete Virtual Environment for Penetration Testing – Part 5

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Great guide

    not sure if it’s my setup (using the latest virtualbox-version 5.1 on linux) i had to activate the flag “Enable EFI” – without it I only got a black screen and no booting.

    after enabling the flag contrary to the guide everything worked fine and i could setup my useraccount.

  2. I created the Mac VM as instructed…when I started it and it went beyond the “Hackintosh” splash page, it went directly to a login page that requires an existing user account. It will not allow me to create a new user. WhY?

Page 3 of 3«123
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge



Is Linux Worth Learning in 2020?
Views: 212 / December 14, 2019
How do I Get MTA Certified?
Views: 821 / December 12, 2019
How much does your PAM software really cost?
Views: 1273 / December 10, 2019
How Do I Get into Android Development?
Views: 1651 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?