5 hours 38 minutes

Video Description

In this video Dean continues outlining the setup process for the pentesting environment. Configuration of the networking mode and hard drive are covered. He notes that setting the networking mode to NAT rather than Bridge mode is important in order to isolate the host machine from the vulnerable VM used for pentesting. Optimal settings for the VM's hard drive and memory are also discussed. It's advised that sufficient resources exist on the host machine in order to accommodate the virtual test environment. The final step is completion of the Kali build process by configuring the basic OS settings such as language and other customizations.

Up Next


This Metasploit tutorial will teach you to utilize the deep capabilities of Metasploit for penetration testing and help you to prepare to run vulnerability assessments for organizations of any size.

Instructed By

Instructor Profile Image
Dean Pompilio
CEO of SteppingStone Solutions