The general workflow for tackling a Kioptrix machine follows a standard pentesting process: Kioptrix Level 1 CTF Walkthrough - Boot-To-Root
Set the network adapter to or NAT Network so your attacking machine (like Kali Linux) can communicate with it. Kioptrix.ova
: You can find the images for the Kioptrix series (Level 1 through Level 5) on VulnHub . The general workflow for tackling a Kioptrix machine