Lab Setup Part 1

Video Activity

In the first module, you'll understand how to setup a malware analysis lab. You'll learn about the various components that are involved in a typical lab setup. We'll explore a basic lab setup, involving running a local VM on a Windows local machine (referred to as the victim) and funnelling traffic through a Linux VM (called the Router). This modul...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
9 hours 10 minutes
Difficulty
Advanced
CEU/CPE
9
Video Description

In the first module, you'll understand how to setup a malware analysis lab. You'll learn about the various components that are involved in a typical lab setup. We'll explore a basic lab setup, involving running a local VM on a Windows local machine (referred to as the victim) and funnelling traffic through a Linux VM (called the Router). This module begins with the installations of VMware workstation, Windows XP, and finally, setup of Kali for networking.

Video Transcription
00:03
>> Welcome to Cybrary. My name is Sean Pierce and I'm
00:03
the subject matter expert for Malware analysis.
00:03
Today we'll be discussing Module 2,
00:03
where we set up a malware analysis lab.
00:03
The industry standard setup is that you run
00:03
a local VM on your local machine,
00:03
and there's a victim,
00:03
usually Windows XP, Windows machine,
00:03
and then there's router or a Linux VM typically,
00:03
where you can funnel the traffic through
00:03
it out to the Internet if you need to.
00:03
Here's our basic setup where today.
00:03
>> I will show you how to
00:03
>> install VMware Workstation,
00:03
and we will install Windows XP,
00:03
and then install Kali Linux as our router.
00:03
Then we'll set up the networking so that
00:03
Windows XP will funnel its traffic to Kali.
00:03
This basic setup, like I said, involves VMware,
00:03
but you can also use VirtualBox from Oracle,
00:03
which is free and open source.
00:03
You can also use VMware Player that's free
00:03
and you can install
00:03
a virtual machine and you can execute it,
00:03
but you cannot snapshot with it.
00:03
Now, I think snapshot is very
00:03
essential to what we're doing because we'll set
00:03
up a machine with our tools
00:03
ready and then execute the malware.
00:03
We'd like to reset it so
00:03
it can run it over and over again.
00:03
I highly suggest using
00:03
either VirtualBox or VMware Workstation.
00:03
The industry standard' s VMware.
00:03
We're going to install our VMware tools.
00:03
We're going to install
00:03
our analysis tools and then we install Kali,
00:03
and we're going to install VMware tools on that.
Up Next