Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Virtual machines"

From NetSec
Jump to: navigation, search
(Subsystems)
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{cleanup}}
 
{{cleanup}}
 
{{expand}}
 
{{expand}}
=Definition=
+
A Virtual Machine, often abbreviated VM, is an isolated operating system, installed within an operating system called a Host Machine, or simply Host. Virtual Machines work through hardware virtualization. The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine." Virtual machines are capable of running an alternate operating system, inside of the current one. This alternate operating system is called a Guest Machine or simply Guest
A Virtual Machine, abbreviated VM, is an isolated operating system, installed within an operating system called a [[Host (Virtualization)|Host Machine]], or simply [[Host (Virtualization)|Host]].
+
 
Virtual Machines work through [[Hardware Virtualization|hardware virtualization]].
+
= Subsystems =
The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine"
+
 
Virtual machines are capable of running an alternate operating system, inside of the current one.
+
Virtual machines are comprised of several components that work together to create the encapsulated virtual machine.
this alternate operating system is called a [[Guest (Virtualization)|Guest Machine]] or simply [[Guest (Virtualization)|Guest]]
+
 
 +
== Hardware Virtualization ==
 +
 
 +
== Host Machine ==
 +
 
 +
== Guest Machine ==
  
 
=Virtualization Tools=
 
=Virtualization Tools=
Line 14: Line 19:
  
 
*[http://www.vmware.com/ VMWare]
 
*[http://www.vmware.com/ VMWare]
 +
 +
=Creating Vulnerable VMs for Penetration Testing=
 +
 +
Setting up your environment
 +
- Software install
 +
- Networking setup
 +
- Removing patches
 +
- Adding user accounts
 +
- Installing vulnerable software
 +
 +
Vulnerable By Design VMs
 +
- Metasploitable
 +
- DamnVulnerableLinux
 +
- DamnVulnerableWebApp
 +
- UltimateLAMP
 +
- Windows XP builds

Latest revision as of 18:46, 24 April 2012

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.

A Virtual Machine, often abbreviated VM, is an isolated operating system, installed within an operating system called a Host Machine, or simply Host. Virtual Machines work through hardware virtualization. The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine." Virtual machines are capable of running an alternate operating system, inside of the current one. This alternate operating system is called a Guest Machine or simply Guest

Subsystems

Virtual machines are comprised of several components that work together to create the encapsulated virtual machine.

Hardware Virtualization

Host Machine

Guest Machine

Virtualization Tools

Creating Vulnerable VMs for Penetration Testing

Setting up your environment

- Software install
- Networking setup
- Removing patches
- Adding user accounts
- Installing vulnerable software

Vulnerable By Design VMs

- Metasploitable
- DamnVulnerableLinux
- DamnVulnerableWebApp
- UltimateLAMP
- Windows XP builds