Setting up a sandboxed hacking lab in Virtualbox
Most of the newbies who wants to learn some hacking skills doesn't how to start and are a little confused. This article is about setting up a sandboxed secure hacking environment through which anyone interested in practicing some hacking is able to do so without worrying about breaking the law or attacking unauthorized targets. The most important point when setting up a sandboxed environment is to isolate the network, i.e, ensure that any packet has no chance to escape outside of your network. The very first time that I built my own hacking environment I was a little bit puzzled about how to isolate my virtual machines from my network. Thank goodness the inventors of the Virtualbox hypervisor put things very easy in order to achieve so. I want to clear up that this article is about setting up a hacking VIRTUAL environment rather than a physical one. The easiest way to create a physical isolated environment is to physically disconnect/unplug your network from the Internet and check that your wireless Network Interface Cards are switched off.
All right! Firstly, let's start explaining/clarifying some concepts. In particular, I'll introduce you the term sandboxing and the different network adapter options that Virtualbox provides us as well as different virtualization terminology, such as hypervisor and virtual machine. Finally, I'll show you which choice among the different ones is the perfect candidate to configure our sandboxed/isolated environment along with the needed configuration paramaters, such as Dynamic Host Configuration Protocol server, etc.
Sandbox in terms of security is a mechanism that separate running programs with the intention to avoid system failures, test unverified software that could end up being malware, analyse malware behavior, and so on. Virtualization is an example of sandbox implementation and it means to create a virtual version of whatever (hardware, network resources, storage devices, etc.). Hypervisors, aka Virtual Machine Monitor (VMM) allows a user to create, manage and govern multiple virtual machines which are sandboxed from the rest of the other systems, i.e, they are isolated from the other virtual machines as well as the host. The hypervisor is normally a piece of software that is in charge of allocating the different hardware resources to each of the guest systems avoiding interruptions among them. Manufacturers commonly provide graphical interfaces for hypervisor configuration. On the other hand, virtual machines are just emulated entire computer systems.
Now that I've explained superficially
Sandbox in terms of security is a mechanism that separate running programs with the intention to avoid system failures, test unverified software that could end up being malware, analyse malware behavior, and so on. Virtualization is an example of sandbox implementation and it means to create a virtual version of whatever (hardware, network resources, storage devices, etc.). Hypervisors, aka Virtual Machine Monitor (VMM) allows a user to create, manage and govern multiple virtual machines which are sandboxed from the rest of the other systems, i.e, they are isolated from the other virtual machines as well as the host. The hypervisor is normally a piece of software that is in charge of allocating the different hardware resources to each of the guest systems avoiding interruptions among them. Manufacturers commonly provide graphical interfaces for hypervisor configuration. On the other hand, virtual machines are just emulated entire computer systems.
![]() |
Source: https://www.howtogeek.com/66734/htg-explains-what-is-a-hypervisor/ |