Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Virtual machines"

From NetSec
Jump to: navigation, search
Line 14: Line 14:
  
 
*[http://www.vmware.com/ VMWare]
 
*[http://www.vmware.com/ VMWare]
 +
 +
=Creating Vulnerable VMs for Penetration Testing=
 +
 +
Setting up your environment
 +
- Software install
 +
- Networking setup
 +
- Removing patches
 +
- Adding user accounts
 +
- Installing vulnerable software
 +
 +
Vulnerable By Design VMs
 +
- Metasploitable
 +
- DamnVulnerableLinux
 +
- DamnVulnerableWebApp
 +
- UltimateLAMP
 +
- Windows XP builds

Revision as of 01:22, 15 March 2012

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.

Definition

A Virtual Machine, abbreviated VM, is an isolated operating system, installed within an operating system called a Host Machine, or simply Host. Virtual Machines work through hardware virtualization. The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine" Virtual machines are capable of running an alternate operating system, inside of the current one. this alternate operating system is called a Guest Machine or simply Guest

Virtualization Tools

Creating Vulnerable VMs for Penetration Testing

Setting up your environment

- Software install
- Networking setup
- Removing patches
- Adding user accounts
- Installing vulnerable software

Vulnerable By Design VMs

- Metasploitable
- DamnVulnerableLinux
- DamnVulnerableWebApp
- UltimateLAMP
- Windows XP builds