Want to set up a hacking lab? You’ll need Kali Linux, Metasploitable 2, and Ubuntu running on VMware. Don’t worry, it’s easier than you think! Just follow along.
What You’ll Need
- VMware Workstation or VMware Player
- Kali Linux ISO
- Metasploitable 2 OVA
- Ubuntu ISO
- A computer with enough storage and RAM
Step 1: Download the Files
Head to these websites and grab the files:
Once downloaded, it’s time to install VMware.
Step 2: Install VMware
- Open the VMware installer.
- Follow the installation steps (just click “Next”).
- Launch VMware when done.
Step 3: Install Kali Linux
Kali is a powerful penetration testing OS. Time to install it!
- Click “Create a New Virtual Machine” in VMware.
- Select “Typical” and click “Next”.
- Choose “Use ISO image” and browse for the Kali Linux ISO file.
- Set a name (e.g., Kali-VM) and pick a location.
- Allocate at least 20GB of disk space.
- Give it 2GB+ RAM for better performance.
- Click “Finish” and start the VM.
Follow the Kali installation steps inside the VM, setting up username and password.

Step 4: Install Metasploitable 2
Metasploitable 2 is a vulnerable machine, perfect for testing exploits.
- Open VMware.
- Click “Open a Virtual Machine”.
- Select the Metasploitable 2 OVA file.
- Click “Import” and let it finish.
- Start the VM.
Once it boots, log in with:
- Username: msfadmin
- Password: msfadmin
And that’s it! Your vulnerable machine is ready for pen-testing.

Step 5: Install Ubuntu
Ubuntu is a user-friendly Linux distro, perfect for practice.
- Click “Create a New Virtual Machine” in VMware.
- Select “Use ISO image” and browse for the Ubuntu ISO.
- Name your VM (e.g., Ubuntu-VM).
- Set disk space (at least 25GB).
- Give it 2GB+ RAM for smooth performance.
- Click “Finish” and start the VM.
Just follow the on-screen Ubuntu installation steps.
Final Setup and Networking
For a proper lab, all VMs should talk to each other.
- Go to VMware settings for each VM.
- Set them all to “Bridged” or “Host-only” networking.
- Start all VMs and test connectivity using
ping
.

Conclusion
You did it! Now you have a full hacking lab with Kali Linux, Metasploitable 2, and Ubuntu on VMware. Time to practice ethical hacking!