- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Kevin Cardwell
- 327字
- 2021-07-16 11:42:12
Summary
In this chapter, we have discussed the different types of virtualization, where type 1, also known as bare metal virtualization, provides the Hypervisor that can be directly accessed and installed in the hardware and with type 2, the Hypervisor installed in the operating system. One of the advantages of a type 1 solution is the fact that the Hypervisor directly installed in the hardware provides for improved performance; a drawback of this is the fact that the hardware has to integrate with the product's Hypervisor and you have to ensure that you check that it does so.
We looked at the different open source virtualization offerings that are possible, and we installed, configured basic settings, and created virtual machines in a number of tools. We downloaded and used an ISO image to create our virtual machine and booted the machine once it was created. Additionally, we downloaded the OWASP Broken Web Application Project virtual machine and used the existing configuration to run the machine.
We also looked at some of the commercial offerings with respect to virtualization, and it is here that we explained the reason why we will work with the virtualization product VMware Workstation from this point forward. Additionally, we discussed the powerful features of both the XenServer and vSphere products.
One of the challenges we face is taking old and existing machines and using them with the different virtualization offerings that are out there, so we discussed a tool from the group at Starwind Software that can be used to convert from VMDK to VHD files and VHD to VMDK files, and with the exception of some, conversions work extremely well.
We concluded this chapter with the concept of P2V, or physical to virtual conversion, which provides a way for us to take an existing or a new physical machine and convert it to a virtual one. In the next chapter, we will look at the challenge of planning and building our range.
- 為你護(hù)航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- Wireshark 2 Quick Start Guide
- Learning Veeam? Backup & Replication for VMware vSphere
- Kali Linux Network Scanning Cookbook(Second Edition)
- 硬黑客:智能硬件生死之戰(zhàn)
- Applied Network Security
- 解密數(shù)據(jù)恢復(fù)
- CTF特訓(xùn)營:技術(shù)詳解、解題方法與競賽技巧
- 實用黑客攻防技術(shù)
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險降低之道
- 數(shù)據(jù)安全架構(gòu)設(shè)計與實戰(zhàn)
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應(yīng)用
- Metasploit 5.0 for Beginners
- 一本書講透混合云安全