Questions about this topic? Sign up to ask in the talk tab.
Virtual machines
From NetSec
Revision as of 17:42, 24 April 2012 by MinnaBeauvais (Talk | contribs) (→Definition: Define sub terms ie. Host Machine, in a subsection here. No need for an entire page unless it is going to include a large amount of info or is relevant across multiple pages which link back to it.)
This article contains too little information, it should be expanded or updated. |
---|
Things you can do to help:
|
A Virtual Machine, often abbreviated VM, is an isolated operating system, installed within an operating system called a Host Machine, or simply Host. Virtual Machines work through hardware virtualization. The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine." Virtual machines are capable of running an alternate operating system, inside of the current one. This alternate operating system is called a Guest Machine or simply Guest
Virtualization Tools
Creating Vulnerable VMs for Penetration Testing
Setting up your environment
- Software install - Networking setup - Removing patches - Adding user accounts - Installing vulnerable software
Vulnerable By Design VMs
- Metasploitable - DamnVulnerableLinux - DamnVulnerableWebApp - UltimateLAMP - Windows XP builds