- Learn Ethical Hacking from Scratch
- Zaid Sabih
- 140字
- 2021-07-16 18:07:24
Setting Up a Lab
In the previous chapter, we learned the concept of hacking. In this chapter, we are going to learn how to set up a virtual environment, so that we can later perform penetration tests on it. In this chapter, we will cover the concept of virtual machines, and will also perform its installation steps. Later in the chapter, we will learn how to install Kali Linux, and the two victim machines on VirtualBox: Windows and the Metasploitable machine. We will also discuss what each of these machines does, and why we are going to use them. Toward the end of the chapter, we will see the concept of snapshots, and how to implement them.
The following topics will be covered in this chapter:
- Lab overview
- Installing Kali Linux
- Installing Metasploitable
- Installing Windows
- Creating snapshots and using snapshots
推薦閱讀
- LED顯示屏組裝與調(diào)試全攻略
- 深入淺出5G核心網(wǎng)技術(shù)
- Android語法范例參考大全
- 移動Ad Hoc網(wǎng)絡(luò)
- 移動通信中繼覆蓋系統(tǒng)設(shè)備與工程設(shè)計
- 電子設(shè)備人機工程設(shè)計及應(yīng)用
- 輕松認識無線電
- 艦船尾跡的電磁成像機理及特征提取技術(shù)
- 光纖通信(第4版)
- 成像雷達并行仿真優(yōu)化技術(shù)
- 數(shù)字視頻處理與顯示
- 電力設(shè)備X射線檢測技術(shù)
- 陣列信號處理及MATLAB實現(xiàn)(第2版)
- iOS開發(fā)快速進階與實戰(zhàn)
- LTE射頻技術(shù)及設(shè)備檢測