A purpose-built academic environment for mastering penetration testing.
Launch your personal Kali Linux instance, follow expert-curated lectures,
and complete real-world exercises — all from your browser.
University-only access
Isolated sandbox
Instant provisioning
kali@kali-labs:~
$ nmap -sV 10.0.0.5
Starting Nmap 7.94 ( https://nmap.org )
Nmap scan report for 10.0.0.5
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.4
80/tcp open http Apache 2.4.49
443/tcp open ssl/http Apache 2.4.49
$
Platform Capabilities
Everything you need to learn offensive security
A complete lab environment designed for academic rigour and practical
skill-building
Instant Lab Access
Spin up a fully-configured Kali Linux VM with a dedicated target machine in under 30 seconds. No
installation or configuration required.
Isolated Sandboxes
Every student receives a dedicated, network-isolated environment. Practice penetration testing safely
— your actions never leave the sandbox.
Curated Curriculum
Eight expert-designed lectures covering Nmap, Netcat, Burp Suite, Wireshark, SQLMap, and more — each
with step-by-step guided exercises.
Browser-Based Desktop
Access a full Kali Linux graphical desktop directly in your browser. Read lectures and interact with
your VM side-by-side in Lab Mode.
Progress Tracking
Mark exercises complete as you go. Your progress is saved automatically so you can pick up exactly
where you left off, any time.
Flexible Access
Choose how you connect — use the in-browser desktop for convenience, or SSH directly from your local
terminal for a native experience.
How It Works
From sign-up to shell in three steps
01
Authenticate
Sign in with your university credentials. Access is restricted to verified DBU students and
staff.
02
Allocate
Launch your personal Kali Linux instance with a single click. Your isolated lab environment is ready
in seconds.
03
Practice
Follow structured lectures, run real tools against target machines, and build hands-on offensive
security skills.
Ready to start your cybersecurity journey?
Create your account and access the lab environment in under a minute.
Welcome to Kali Labs!
Your hands-on cybersecurity training environment. Here's how it works:
1
Choose a lecture
Study the concepts, tools, and techniques
2
Allocate your VM
Launch a personal Kali Linux + target environment
3
Enter Lab Mode
Lecture and Kali desktop side by side
4
Complete exercises
Practice on the real machine and track your progress
Continue Learning----
Lab Environment
Your Lab Environment
Launch and manage your personal Kali Linux instance
No Active Session
Launch a Kali Linux VM with a dedicated target machine to begin practicing
VM ready in ~30 seconds
Isolated network sandbox
Browser-based desktop
Session ProvisionedStep 02 — Choose Workspace
Select your workspace
Three pathways are available for connecting to your dedicated Kali Linux instance. The recommended pathway pairs lecture material with the live desktop in a synchronized split view, ideal for guided coursework.
Coursework
Integrated Lab
Lecture material and a live Kali Linux desktop in a synchronized split view, with per-exercise progress tracking.
Split viewProgress tracking
Lightweight
Browser Terminal
A minimal web shell with no desktop overhead — well-suited to scripted work and command-line exercises.
No client installLow bandwidth
Advanced
Local Terminal
Connect over SSH from your own terminal — for students who prefer a native toolchain such as tmux or custom tooling.
SSH credentialsPort forwarding
Kali IP--
Target IP--
Status--
Local Terminal Access
SSH Connection Details
Use these credentials to connect from your terminal
Host--
Usernamekali
Password--
Target IP--
Quick Connect Command
ssh kali@--
Quick Tips
The target machine (Metasploitable) is accessible from your Kali instance
Use nmap to scan the target: nmap -sV <target-ip>
Your session expires after 1 hour of inactivity
Lecture
Kali Desktop
Target--
Password--
Preparing your Lab Environment
Provisioning an isolated Kali Linux instance with a dedicated target
machine.
Allocating virtual machine
Booting Kali Linux & target
Establishing secure tunnel
Launching graphical desktop
Terminate Session
Your Kali instance and all running processes will be stopped.
Provisioning your Lab Environment
Typical setup time: under 60 seconds. Please keep this tab open.