Cyberattacks happen every 39 seconds — and if you want to learn how to stop them, you need a safe, legal environment to practice.
Why You Need a Home Lab?
A home lab lets you hack, defend, and experiment without breaking laws or risking real systems. Whether you’re preparing for certifications (like CEH or OSCP) or just curious how hackers operate, this guide will show you how to build your own cyber playground for free.

DISCLAIMER: FOR EDUCATIONAL PURPOSES ONLY.
The CyberBin disclaims all liability for unauthorized use of techniques described. Readers must comply with all applicable laws and obtain authorization before testing systems.
Requirements
Item | Purpose | Details |
Computer (Windows or Linux) | Your Host Machine | 16GB+ RAM, 50GB+ free storage |
VirtualBox | Run Virtual Machines | https://www.virtualbox.org/ (free) |
Kali Linux ISO | Hacker’s OS | https://www.kali.org/get-kali/#kali-platforms |
Metasploitable2 | Intentionally Vulnerable Machine | https://sourceforge.net/projects/metasploitable/ |
Step 1: Install VirtualBox
Instructions:
- Download VirtualBox here. Click
download
and choose your host machine.
- Once the download completed > Double-click on the installer > Click Next > Accept defaults.
- Open VirtualBox after installation.

VirtualBox Dashboard After Installation
Step 2: Set up Kali Linux
Instructions:
- Download Kali Linux ISO from kali.org.
- Choose Installer images.
- Download the Installer Version
- Once done,
Step 3: Set up Metasploitable2
Instructions:
1- Download here

2. Extract the Metasploitable2 ZIP file
3. In VirtualBox, click New. Name: Metasploitable2
Warning:
Never expose Metasploitable2 to the internet -it’s intentionally vulnerable!
Step 4: Network Configuration
Instructions:
- Go to V
jgcvhggvvuv iygf yuhg yhfguy ygby