Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this video Dean continues outlining the setup process for the pentesting environment. Configuration of the networking mode and hard drive are covered. He notes that setting the networking mode to NAT rather than Bridge mode is important in order to isolate the host machine from the vulnerable VM used for pentesting. Optimal settings for the VM's hard drive and memory are also discussed. It's advised that sufficient resources exist on the host machine in order to accommodate the virtual test environment. The final step is completion of the Kali build process by configuring the basic OS settings such as language and other customizations.