Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Virtual machines"
From NetSec
(→Definition) |
(→Subsystems) |
||
(4 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
{{cleanup}} | {{cleanup}} | ||
− | + | {{expand}} | |
− | A Virtual Machine, abbreviated VM, is an isolated operating system, installed within an operating system called a | + | A Virtual Machine, often abbreviated VM, is an isolated operating system, installed within an operating system called a Host Machine, or simply Host. Virtual Machines work through hardware virtualization. The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine." Virtual machines are capable of running an alternate operating system, inside of the current one. This alternate operating system is called a Guest Machine or simply Guest |
− | Virtual Machines work through | + | |
− | The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine" | + | = Subsystems = |
− | Virtual machines are capable of running an alternate operating system, inside of the current one. | + | |
− | + | Virtual machines are comprised of several components that work together to create the encapsulated virtual machine. | |
+ | |||
+ | == Hardware Virtualization == | ||
+ | |||
+ | == Host Machine == | ||
+ | |||
+ | == Guest Machine == | ||
=Virtualization Tools= | =Virtualization Tools= | ||
Line 13: | Line 19: | ||
*[http://www.vmware.com/ VMWare] | *[http://www.vmware.com/ VMWare] | ||
+ | |||
+ | =Creating Vulnerable VMs for Penetration Testing= | ||
+ | |||
+ | Setting up your environment | ||
+ | - Software install | ||
+ | - Networking setup | ||
+ | - Removing patches | ||
+ | - Adding user accounts | ||
+ | - Installing vulnerable software | ||
+ | |||
+ | Vulnerable By Design VMs | ||
+ | - Metasploitable | ||
+ | - DamnVulnerableLinux | ||
+ | - DamnVulnerableWebApp | ||
+ | - UltimateLAMP | ||
+ | - Windows XP builds |
Latest revision as of 17:46, 24 April 2012
This article contains too little information, it should be expanded or updated. |
---|
Things you can do to help:
|
A Virtual Machine, often abbreviated VM, is an isolated operating system, installed within an operating system called a Host Machine, or simply Host. Virtual Machines work through hardware virtualization. The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine." Virtual machines are capable of running an alternate operating system, inside of the current one. This alternate operating system is called a Guest Machine or simply Guest
Contents
Subsystems
Virtual machines are comprised of several components that work together to create the encapsulated virtual machine.
Hardware Virtualization
Host Machine
Guest Machine
Virtualization Tools
Creating Vulnerable VMs for Penetration Testing
Setting up your environment
- Software install - Networking setup - Removing patches - Adding user accounts - Installing vulnerable software
Vulnerable By Design VMs
- Metasploitable - DamnVulnerableLinux - DamnVulnerableWebApp - UltimateLAMP - Windows XP builds