Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Virtual machines"
From NetSec
Madelai44A (Talk | contribs) |
|||
| Line 14: | Line 14: | ||
*[http://www.vmware.com/ VMWare] | *[http://www.vmware.com/ VMWare] | ||
| + | |||
| + | =Creating Vulnerable VMs for Penetration Testing= | ||
| + | |||
| + | Setting up your environment | ||
| + | - Software install | ||
| + | - Networking setup | ||
| + | - Removing patches | ||
| + | - Adding user accounts | ||
| + | - Installing vulnerable software | ||
| + | |||
| + | Vulnerable By Design VMs | ||
| + | - Metasploitable | ||
| + | - DamnVulnerableLinux | ||
| + | - DamnVulnerableWebApp | ||
| + | - UltimateLAMP | ||
| + | - Windows XP builds | ||
Revision as of 00:22, 15 March 2012
| This article contains too little information, it should be expanded or updated. |
|---|
Things you can do to help:
|
Definition
A Virtual Machine, abbreviated VM, is an isolated operating system, installed within an operating system called a Host Machine, or simply Host. Virtual Machines work through hardware virtualization. The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine" Virtual machines are capable of running an alternate operating system, inside of the current one. this alternate operating system is called a Guest Machine or simply Guest
Virtualization Tools
Creating Vulnerable VMs for Penetration Testing
Setting up your environment
- Software install - Networking setup - Removing patches - Adding user accounts - Installing vulnerable software
Vulnerable By Design VMs
- Metasploitable - DamnVulnerableLinux - DamnVulnerableWebApp - UltimateLAMP - Windows XP builds