Skip to content

Commit a18388f

Browse files
authored
Update Villain.md
1 parent 13968ae commit a18388f

File tree

1 file changed

+94
-24
lines changed

1 file changed

+94
-24
lines changed

Villain.md

Lines changed: 94 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,112 @@
11
# Simple Villain Framework Lab Guide
22

3-
A step-by-step lab using **Kali Linux** (attacker) and **Windows 10** (victim) in VirtualBox, from payload gen to file transfers.
3+
# 1. VirtualBox Kali VM & Real-World Networking Setup
4+
5+
## 🧩 Prerequisites
6+
7+
```markdown
8+
- VirtualBox installed on Host (Windows or Linux)
9+
- Kali Linux VM installed
10+
- VirtualBox Extension Pack (optional but recommended)
11+
- Administrator access on both host and guest
12+
- Mobile hotspot capability for simulation
13+
```
414

515
---
616

7-
## 1. VirtualBox VM & Networking Setup
17+
## Part 1: Host-Only Adapter Networking (VirtualBox)
818

9-
1. **Create VMs** in VirtualBox:
19+
### Step 1: Configure Adapter 2 Before Starting Kali VM
1020

11-
* **Kali Linux**
12-
* **Windows 10**
13-
2. **Set both adapters** to an **Internal Network** (or Host-Only) named `LabNet`.
14-
3. **Assign static IPs** on the same `/24` subnet:
21+
```markdown
22+
1. Open VirtualBox Manager
23+
2. Select your Kali Linux VM → Click Settings
24+
3. Go to the Network tab
25+
4. Enable Adapter 2:
26+
- Enable Network Adapter (checked)
27+
- Attached to: Host-Only Adapter
28+
5. Select the host-only network (e.g., VirtualBox Host-Only Ethernet Adapter)
29+
```
1530

16-
* **Kali** (terminal):
31+
### Step 2: Identify Network Adapters on Host & Kali
1732

18-
```bash
19-
sudo ip addr add 192.168.56.10/24 dev eth0
20-
sudo ip link set eth0 up
21-
```
22-
* **Windows 10** (Control Panel → Network Adapter → IPv4 settings):
33+
#### On Host (Windows):
34+
```bash
35+
ipconfig
36+
```
2337

24-
```text
25-
IP address: 192.168.56.20
26-
Subnet mask: 255.255.255.0
27-
Gateway/DNS: (leave blank)
28-
```
29-
4. **Verify connectivity**:
38+
#### On Kali VM:
39+
```bash
40+
ip a
41+
```
3042

31-
```bash
32-
# On Kali
33-
ping 192.168.56.20
34-
```
43+
> ✅ You should see a new interface like `eth1` or `enp0s8` (depending on VirtualBox config)
44+
45+
### Step 3: Ensure Both Are on the Same Subnet
46+
47+
```markdown
48+
Example:
49+
- Windows Host IP: 192.168.56.1
50+
- Kali VM IP: 192.168.56.101
51+
```
52+
53+
> Make sure both IPs fall within the same subnet range like `192.168.56.0/24`
54+
55+
### Step 4: Test Connectivity
56+
57+
#### From Host to Kali:
58+
```bash
59+
ping 192.168.56.101
60+
```
61+
62+
#### From Kali to Host:
63+
```bash
64+
ping 192.168.56.1
65+
```
3566

36-
You should see replies.
67+
> ✔ If both are reachable, host-only networking is correctly configured.
3768
3869
---
3970

71+
## Part 2: Real-World Payload Delivery via Mobile Hotspot
72+
73+
### Objective
74+
Simulate real-world payload delivery by connecting two physical PCs (Attacker and Victim) over a common mobile hotspot.
75+
76+
### Step 1: Connect Both PCs to Mobile Hotspot
77+
78+
```markdown
79+
1. Turn on mobile hotspot on your smartphone
80+
2. Connect both Attacker and Victim laptops to the hotspot
81+
3. Use terminal or CLI to verify both systems are in the same subnet
82+
```
83+
84+
#### On Both PCs:
85+
```bash
86+
# Windows
87+
ipconfig
88+
89+
# Linux/Kali
90+
ifconfig
91+
```
92+
93+
#### IP Confirmation:
94+
```markdown
95+
- Attacker IP: 192.168.43.120
96+
- Victim IP: 192.168.43.101
97+
```
98+
99+
> ✅ Same subnet confirmed
100+
101+
---
102+
103+
Use this guide for setting up practical labs or red team exercises. For ethical hacking training only. Contact your admin before using in any production or personal environment.
104+
105+
---
106+
107+
108+
109+
40110
## 2. Prepare Kali Attacker
41111

42112
1. **Update & upgrade**:

0 commit comments

Comments
 (0)