Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Virtual machines"

From NetSec
Jump to: navigation, search
(added categories to remove the unneeded blank page links to various subsystems of virtual machines which can be defined here.)
(Subsystems)
 
Line 4: Line 4:
  
 
= Subsystems =
 
= Subsystems =
 +
 +
Virtual machines are comprised of several components that work together to create the encapsulated virtual machine.
  
 
== Hardware Virtualization ==
 
== Hardware Virtualization ==
Line 9: Line 11:
 
== Host Machine ==  
 
== Host Machine ==  
  
== Guest Machine ==  
+
== Guest Machine ==
  
 
=Virtualization Tools=
 
=Virtualization Tools=

Latest revision as of 18:46, 24 April 2012

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.

A Virtual Machine, often abbreviated VM, is an isolated operating system, installed within an operating system called a Host Machine, or simply Host. Virtual Machines work through hardware virtualization. The original definition of a virtual machine is "An efficient, isolated duplicate of a real machine." Virtual machines are capable of running an alternate operating system, inside of the current one. This alternate operating system is called a Guest Machine or simply Guest

Subsystems

Virtual machines are comprised of several components that work together to create the encapsulated virtual machine.

Hardware Virtualization

Host Machine

Guest Machine

Virtualization Tools

Creating Vulnerable VMs for Penetration Testing

Setting up your environment

- Software install
- Networking setup
- Removing patches
- Adding user accounts
- Installing vulnerable software

Vulnerable By Design VMs

- Metasploitable
- DamnVulnerableLinux
- DamnVulnerableWebApp
- UltimateLAMP
- Windows XP builds