官术网_书友最值得收藏!

Setting Up a Lab

In the previous chapter, we learned the concept of hacking. In this chapter, we are going to learn how to set up a virtual environment, so that we can later perform penetration tests on it. In this chapter, we will cover the concept of virtual machines, and will also perform its installation steps. Later in the chapter, we will learn how to install Kali Linux, and the two victim machines on VirtualBox: Windows and the Metasploitable machine. We will also discuss what each of these machines does, and why we are going to use them. Toward the end of the chapter, we will see the concept of snapshots, and how to implement them.

The following topics will be covered in this chapter:

  • Lab overview
  • Installing Kali Linux
  • Installing Metasploitable
  • Installing Windows
  • Creating snapshots and using snapshots
主站蜘蛛池模板: 会昌县| 怀仁县| 龙胜| 桃江县| 城步| 金阳县| 沁阳市| 如皋市| 吐鲁番市| 满洲里市| 平利县| 长泰县| 新晃| 昌邑市| 波密县| 新野县| 香河县| 邯郸市| 闽侯县| 轮台县| 郓城县| 海兴县| 锦州市| 兴山县| 旬阳县| 正宁县| 松江区| 安顺市| 大荔县| 河北省| 正蓝旗| 开化县| 日照市| 临沂市| 石屏县| 大港区| 临海市| 吉首市| 高碑店市| 长垣县| 从化市|