Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Virtual machines"
From NetSec
Madelai44A (Talk | contribs) |
|||
Line 14: | Line 14: | ||
*[http://www.vmware.com/ VMWare] | *[http://www.vmware.com/ VMWare] | ||
+ | |||
+ | =Creating Vulnerable VMs for Penetration Testing= | ||
+ | |||
+ | Setting up your environment | ||
+ | - Software install | ||
+ | - Networking setup | ||
+ | - Removing patches | ||
+ | - Adding user accounts | ||
+ | - Installing vulnerable software | ||
+ | |||
+ | Vulnerable By Design VMs | ||
+ | - Metasploitable | ||
+ | - DamnVulnerableLinux | ||
+ | - DamnVulnerableWebApp | ||
+ | - UltimateLAMP | ||
+ | - Windows XP builds |
Revision as of 00:22, 15 March 2012
This article contains too little information, it should be expanded or updated. |
---|
Things you can do to help:
|
Definition
A Virtual Machine, abbreviated VM, is an isolated operating system, installed within an operating system called a Host Machine, or simply Host. Virtual Machines work through hardware virtualization. The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine" Virtual machines are capable of running an alternate operating system, inside of the current one. this alternate operating system is called a Guest Machine or simply Guest
Virtualization Tools
Creating Vulnerable VMs for Penetration Testing
Setting up your environment
- Software install - Networking setup - Removing patches - Adding user accounts - Installing vulnerable software
Vulnerable By Design VMs
- Metasploitable - DamnVulnerableLinux - DamnVulnerableWebApp - UltimateLAMP - Windows XP builds