Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Virtual machines"
From NetSec
(added categories to remove the unneeded blank page links to various subsystems of virtual machines which can be defined here.) |
(→Subsystems) |
||
Line 4: | Line 4: | ||
= Subsystems = | = Subsystems = | ||
+ | |||
+ | Virtual machines are comprised of several components that work together to create the encapsulated virtual machine. | ||
== Hardware Virtualization == | == Hardware Virtualization == | ||
Line 9: | Line 11: | ||
== Host Machine == | == Host Machine == | ||
− | == Guest Machine == | + | == Guest Machine == |
=Virtualization Tools= | =Virtualization Tools= |
Latest revision as of 17:46, 24 April 2012
This article contains too little information, it should be expanded or updated. |
---|
Things you can do to help:
|
A Virtual Machine, often abbreviated VM, is an isolated operating system, installed within an operating system called a Host Machine, or simply Host. Virtual Machines work through hardware virtualization. The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine." Virtual machines are capable of running an alternate operating system, inside of the current one. This alternate operating system is called a Guest Machine or simply Guest
Contents
Subsystems
Virtual machines are comprised of several components that work together to create the encapsulated virtual machine.
Hardware Virtualization
Host Machine
Guest Machine
Virtualization Tools
Creating Vulnerable VMs for Penetration Testing
Setting up your environment
- Software install - Networking setup - Removing patches - Adding user accounts - Installing vulnerable software
Vulnerable By Design VMs
- Metasploitable - DamnVulnerableLinux - DamnVulnerableWebApp - UltimateLAMP - Windows XP builds