Chapter 3: Further Reading — Setting Up Your Hacking Lab
An annotated bibliography of resources for building, expanding, and maintaining your hacking lab, mastering Kali Linux, and leveraging online training platforms. Resources are organized by topic.
Kali Linux
Kali Linux Revealed: Mastering the Penetration Testing Distribution by Raphaël Hertzog and Jim O'Gorman (2017)
Offensive Security Press. Available free at kali.org/docs/
The official Kali Linux book, written by two of its lead developers. Covers installation, configuration, package management, and customization in detail. Available as a free PDF from the Kali website. The definitive reference for any Kali configuration question you encounter. While the specific tool versions mentioned may be dated, the system administration fundamentals remain essential.
Kali Linux Documentation
Available at kali.org/docs/
The official documentation site covers installation, configuration, virtualization, and tool usage. Regularly updated. Your first stop for any Kali-specific question. The virtualization guides are particularly relevant to this chapter.
Kali Linux Tool Listing
Available at kali.org/tools/
A categorized listing of every tool included in Kali Linux, with descriptions and usage guidance. Invaluable for discovering tools you may not have encountered. Browse by category when you face a new testing scenario.
Virtualization
VirtualBox User Manual
Available at virtualbox.org/manual/
The comprehensive official documentation for VirtualBox. Chapter 6 (Virtual Networking) is essential reading for understanding the network modes discussed in Section 3.6. Chapter 1 (Introduction to VirtualBox) provides useful background on virtualization concepts.
VMware Workstation Pro Documentation
Available at docs.vmware.com
If you use VMware instead of VirtualBox, the official documentation covers networking, snapshots, and VM configuration. VMware's networking model uses slightly different terminology but maps closely to VirtualBox's concepts.
Mastering KVM Virtualization by Vedran Dakic et al. (2020)
Packt Publishing. ISBN: 978-1838828714
For advanced users who want to explore Type 1 virtualization on Linux. KVM (Kernel-based Virtual Machine) is the virtualization technology underlying most cloud platforms. Understanding KVM deepens your knowledge of the virtualization stack and is relevant to cloud penetration testing.
Lab Building and Practice Environments
VulnHub
Available at vulnhub.com
The largest repository of downloadable vulnerable VMs, with hundreds of machines ranging from beginner to expert difficulty. Each VM's page includes a description and difficulty rating. Community writeups provide solutions and learning opportunities. Directly referenced in Section 3.5.3. Start with the "Beginner" filtered list.
DVWA (Damn Vulnerable Web Application)
GitHub: github.com/digininja/DVWA
The official DVWA repository with installation instructions, documentation, and the source code. Reading the source code for each vulnerability exercise — particularly the "Impossible" level — teaches secure coding practices alongside hacking techniques. An excellent resource for understanding both offense and defense.
Metasploitable Documentation
Available at docs.rapid7.com
Rapid7's documentation for Metasploitable, including the list of intentionally included vulnerabilities and their configurations. Useful as a reference when working through exercises and for understanding exactly what each vulnerable service is designed to teach.
Building Virtual Machine Labs: A Hands-On Guide by Tony Robinson (2017)
Independently published. ISBN: 978-1546932635
A dedicated guide to building complex virtual lab environments for security testing. Covers multi-machine configurations, Active Directory labs, network segmentation with virtual routers, and advanced scenarios. Directly relevant to the lab expansion roadmap in Section 3.10.
DVWA, WebGoat, and Juice Shop Comparison
OWASP maintains all three of these deliberately vulnerable web applications. DVWA (PHP-based, adjustable difficulty), WebGoat (Java-based, guided lessons), and Juice Shop (Node.js, gamified with a scoreboard) each offer different learning approaches. Deploy all three as Docker containers for comprehensive web application practice.
Online Training Platforms
HackTheBox Academy
Available at academy.hackthebox.com
HTB Academy provides structured learning modules that teach specific techniques with theory and practice. Modules are organized by topic and difficulty. Some are free, others require subscription. An excellent bridge between TryHackMe's guided approach and HackTheBox's open-ended machines.
TryHackMe Learning Paths
Available at tryhackme.com/paths
TryHackMe organizes rooms into learning paths that provide structured progression. The "Complete Beginner" and "Jr Penetration Tester" paths are recommended starting points referenced in Section 3.7.2. Path descriptions include estimated completion times and prerequisite recommendations.
PortSwigger Web Security Academy
Available at portswigger.net/web-security
The most comprehensive free web application security training resource available. Over 200 interactive labs covering all major web vulnerability classes. Directly relevant to web application testing chapters later in this book. Start with SQL Injection and Cross-Site Scripting topics.
OverTheWire Wargames
Available at overthewire.org/wargames/
A collection of wargames that teach security concepts through progressive challenges. "Bandit" teaches Linux command-line fundamentals. "Natas" teaches web application security. "Narnia" teaches binary exploitation. All are free and browser-accessible. The Bandit wargame is an excellent complement to Chapter 3 for readers who need to strengthen their Linux command-line skills.
Proving Grounds (Offensive Security)
Available at offsec.com/labs/
Offensive Security's practice platform, featuring machines designed in the style of the OSCP exam. Available in "Play" (free, community machines) and "Practice" (paid, curated by OffSec) tiers. The most directly relevant platform for OSCP certification preparation.
Linux Fundamentals
The Linux Command Line by William Shotts (2019)
No Starch Press. ISBN: 978-1593279523. Also available free at linuxcommand.org
If your Linux command-line skills need strengthening, this book provides a comprehensive foundation. Kali Linux is Debian-based, so all standard Linux commands apply. Focus on file management, text processing, permissions, networking commands, and scripting chapters.
Linux Journey
Available at linuxjourney.com
A free, interactive resource for learning Linux fundamentals. Covers command line, file system, users, permissions, processes, packages, and networking. A good starting point if you are new to Linux.
Security and Legal Awareness
SANS: Computer Security Laws and Regulations
Available at sans.org/reading-room (search for "computer crime law")
Multiple SANS reading room papers address the legal framework surrounding security testing. Understanding the legal landscape is essential for lab safety and professional practice.
Electronic Frontier Foundation: Coders' Rights Project
Available at eff.org/issues/coders
The EFF's resources on the legal rights of security researchers, including guidance on responsible disclosure, CFAA protections, and recent case law. Directly relevant to the legal considerations discussed in Case Study 3.1.
Cybersecurity Law by Jeff Kosseff (2022)
Wiley. ISBN: 978-1119822172
A comprehensive legal textbook covering U.S. cybersecurity law, including the CFAA, state data breach notification laws, and sector-specific regulations. While not a practical hacking book, understanding the legal framework is essential for any ethical hacker.
Docker and Containerization
Docker Documentation: Getting Started
Available at docs.docker.com/get-started/
Docker is increasingly used for deploying vulnerable targets and security tools. The official getting started guide covers installation, basic commands, and container management. Essential for the Docker-based target deployments described in Section 3.5.5.
Docker Deep Dive by Nigel Poulton (2023)
Independently published. ISBN varies by edition.
A practical guide to Docker that goes beyond the basics. Understanding Docker internals is valuable both for lab management and for later chapters covering container security testing.
Recommended Reading Order
For lab setup and optimization: 1. Kali Linux Documentation — Installation and configuration 2. VirtualBox User Manual, Chapter 6 — Network configuration 3. VulnHub — Browse and download first target VMs 4. Building Virtual Machine Labs (Robinson) — Advanced lab architecture 5. TryHackMe "Complete Beginner" path — Guided first exercises 6. The Linux Command Line (Shotts) — If Linux skills need reinforcement
For ongoing lab expansion: 7. Docker Getting Started — For container-based targets 8. HackTheBox — For challenging practice 9. PortSwigger Web Security Academy — For web-specific skills 10. SANS Holiday Hack Challenge — Annual professional-grade event