Home Lab Setup Part 2 of 3

A home lab with no targets is just a fancy VM manager. In Part 2 of the Home Lab Setup series, we get operational — adding your attack machine, standing up your first target, and making sure everything can actually talk to each other.
🎯 What We’ll Cover
– Installing and configuring Kali Linux as your attack machine
– Setting up Metasploitable 2 as your first target VM
– Network segmentation
— keeping lab traffic off your home network
– Snapshot strategy
— saving and restoring VM states before and after testing
– Verification: confirming your attacker and target can see each other
🔗 Stay connected:
– Cover6 Solutions: https://www.cover6solutions.com
– YouTube (live streams + replays): https://www.youtube.com/@Cover6Solutions
– Courses and certification prep: https://cover6solutions.com/courses/
🎤 Submit a talk/demo: https://www.papercall.io/cover6community