Tier 1: Minimum Viable Lab
Time Required: 2-3 hours Cost: $0 Requirements: 8GB RAM minimum, 50GB free disk space
What You're Building
1 Kali Linux VM (attacker)
1 Windows 10 VM (target)
Isolated network for safe testing
What You Can Practice: Days 1-14 (Reconnaissance through C2)
Step 1: Install Virtualization Software
Option A: VirtualBox (Recommended for Beginners)
Download VirtualBox from: https://www.virtualbox.org/wiki/Downloads
Choose your host OS (Windows, macOS, or Linux)
Download the Extension Pack as well
Install VirtualBox:
Windows: Run the .exe installer, accept defaults
macOS: Open the .dmg and drag to Applications
Linux:
sudo apt install virtualbox(Ubuntu/Debian)
Install Extension Pack by double-clicking the downloaded file
Option B: VMware Workstation Player
Download from: https://www.vmware.com/products/workstation-player.html
Choose "Workstation Player for Windows" or Linux
Run installer, accept license for personal use
Restart computer when prompted
Step 2: Download Kali Linux VM
Pre-built VM (Easiest Method)
Download the appropriate version:
For VirtualBox: Download "Kali Linux VirtualBox 64-bit (OVA)"
For VMware: Download "Kali Linux VMware 64-bit (7z)"
File size: ~3.5GB (this will take time)
Import into VirtualBox
Open VirtualBox
Click File → Import Appliance
Browse to downloaded .ova file
Click Next, then Import
Wait 5-10 minutes for import to complete
Import into VMware
Extract the 7z file (use 7-Zip on Windows)
Open VMware Workstation Player
Click Open a Virtual Machine
Browse to the extracted .vmx file
Click Open
Default Credentials
Username: kali
Password: kali
Change this immediately after first login!
Step 3: Download Windows 10 VM
Get Windows 10 ISO
Click Start your free trial
Fill out form (use any business email)
Choose ISO - Enterprise format
Select language and download (64-bit)
File size: ~5GB
Step 4: Create Windows 10 VM
In VirtualBox
Click New in VirtualBox
Name:
Windows10-TargetType: Microsoft Windows
Version: Windows 10 (64-bit)
Click Next
Memory: 4096 MB (4GB) minimum
Create virtual hard disk: 40 GB (VDI, Dynamically allocated)
Click Create
Configure VM Before Starting
Select the VM, click Settings
System → Processor: Assign 2 CPUs
Display → Screen: Set Video Memory to 128 MB
Storage: Click empty CD icon
Click disk icon → Choose disk file
Select downloaded Windows 10 ISO
Network → Adapter 1: Attached to: NAT Network (we'll create this later)
Click OK
In VMware
Click Create a New Virtual Machine
Select Installer disc image file (iso)
Browse to Windows 10 ISO
Windows product key: Leave blank (evaluation)
Name:
Windows10-TargetDisk size: 40 GB, Store as single file
Click Customize Hardware:
Memory: 4096 MB
Processors: 2
Click Finish
Step 5: Install Windows 10
Start the Windows 10 VM
Windows Setup will load
Language: English, Click Next
Click Install Now
Select Windows 10 Enterprise Evaluation
Accept license terms
Choose Custom: Install Windows only
Select the unallocated disk space, click Next
Wait 15-20 minutes for installation
VM will restart automatically
Windows Setup (OOBE)
Region: Select your region
Keyboard: Confirm layout
Skip additional keyboard layouts
Choose Set up for personal use
Skip signing in with Microsoft account → Offline account
Username:
labuserPassword:
Password123!(use something memorable)Security questions: Answer them (you'll need these)
Turn off all privacy settings
Skip Cortana
Wait for desktop to load
Initial Windows Configuration
Right-click Start → System
Click Rename this PC → Name it
WIN10-TARGETRestart when prompted
After restart, disable Windows Defender:
Open Windows Security
Virus & threat protection → Manage settings
Turn OFF Real-time protection
Turn OFF Cloud-delivered protection
Turn OFF Automatic sample submission
Note: Defender will re-enable periodically. For permanent disabling, use Group Policy (gpedit.msc) or registry edits.
Step 6: Create Isolated Network
VirtualBox - Create NAT Network
Open VirtualBox → File → Preferences
Click Network → NAT Networks tab
Click green + icon to add network
Name it
RedTeamLabNetwork CIDR:
10.10.10.0/24Enable DHCP
Click OK
Assign VMs to Network
Select Kali VM → Settings → Network
Adapter 1: Attached to NAT Network
Name:
RedTeamLabClick OK
Repeat for Windows 10 VM
VMware - Create Virtual Network
Open VMware → Edit → Virtual Network Editor
Click Change Settings (requires admin)
Click Add Network
Select VMnet2 → OK
Choose Host-only (for isolation) or NAT (for internet)
Subnet IP:
10.10.10.0Subnet mask:
255.255.255.0Click Apply
Assign VMs to Network
Select Kali VM → Edit virtual machine settings
Network Adapter → Custom: VMnet2
Click OK
Repeat for Windows 10 VM
Step 7: Verify Connectivity
Start Both VMs
Start Kali Linux VM
Start Windows 10 VM
Log into both
Find IP Addresses
On Kali:
ip addr show
# Look for inet address (e.g., 10.10.10.5)On Windows 10:
ipconfig
# Look for IPv4 Address (e.g., 10.10.10.6)Test Connectivity
From Kali to Windows:
ping 10.10.10.6
# Should see repliesFrom Windows to Kali:
ping 10.10.10.5
# Should see repliesIf pings fail:
Verify both VMs are on same network
On Windows: Turn OFF Windows Firewall temporarily
Control Panel → Windows Defender Firewall → Turn off
Step 8: Install Essential Tools
On Kali Linux
Kali comes pre-loaded with most tools. Update everything:
sudo apt update
sudo apt upgrade -y
sudo apt install -y metasploit-frameworkOn Windows 10 Target
Install some vulnerable software for practice:
Disable Windows Updates:
Settings → Update & Security → Pause updates for 7 days
Install Python:
Download from: https://www.python.org/downloads/
Run installer, check "Add to PATH"
Install a browser (for credential harvesting practice):
Chrome or Firefox
Create some test users:
# Open PowerShell as Administrator
net user testuser Password123! /add
net user admin Admin123! /add
net localgroup Administrators admin /addStep 9: Take Snapshots
Critical: Before you start breaking things, take snapshots!
VirtualBox
Select VM (powered off)
Click Snapshots button (top right)
Click camera icon Take
Name:
Clean InstallClick OK
Repeat for both VMs
VMware
Select VM → VM → Snapshot → Take Snapshot
Name:
Clean InstallDescription:
Fresh install before any testingClick Take Snapshot
Repeat for both VMs
To restore: VM → Snapshot → Revert to saved snapshot
Step 10: Test Your Lab
Quick Validation Checklist
Run these tests to confirm everything works:
✅ Network Connectivity:
# From Kali
ping 10.10.10.6
nmap -sn 10.10.10.0/24✅ Internet Access (if needed):
# From Kali
ping 8.8.8.8
curl https://www.google.com✅ Port Scanning:
# From Kali
nmap -sV -p- 10.10.10.6
# Should see open ports (135, 139, 445, etc.)✅ SMB Access:
# From Kali
smbclient -L //10.10.10.6 -U labuser
# Enter password when promptedTier 1 Complete! 🎉
You now have a working red team lab. You can practice:
Network reconnaissance (Days 1-2)
Payload creation (Day 3)
Exploitation techniques (Day 5)
Post-exploitation (Day 6)
Persistence mechanisms (Day 8)
C2 communications (Days 10-11)
Next Steps
Start with Day 1 content
Practice each technique in your lab
Break things (that's what snapshots are for!)
When ready for AD attacks, build Tier 2
© 2025 Maxwell Cross - All Rights Reserved
Last updated
Was this helpful?