官术网_书友最值得收藏!

Setting Up a Lab

In the previous chapter, we learned the concept of hacking. In this chapter, we are going to learn how to set up a virtual environment, so that we can later perform penetration tests on it. In this chapter, we will cover the concept of virtual machines, and will also perform its installation steps. Later in the chapter, we will learn how to install Kali Linux, and the two victim machines on VirtualBox: Windows and the Metasploitable machine. We will also discuss what each of these machines does, and why we are going to use them. Toward the end of the chapter, we will see the concept of snapshots, and how to implement them.

The following topics will be covered in this chapter:

  • Lab overview
  • Installing Kali Linux
  • Installing Metasploitable
  • Installing Windows
  • Creating snapshots and using snapshots
主站蜘蛛池模板: 龙南县| 通山县| 钟祥市| 刚察县| 阳原县| 定兴县| 藁城市| 和田市| 昭苏县| 兴安县| 武定县| 湄潭县| 新源县| 临清市| 长子县| 云浮市| 赤峰市| 南岸区| 瓦房店市| 镇安县| 建始县| 无极县| 凤凰县| 望江县| 庆安县| 玉溪市| 辽宁省| 上饶市| 延边| 济源市| 墨玉县| 库尔勒市| 安图县| 祁东县| 日土县| 宁河县| 大安市| 新巴尔虎右旗| 密云县| 宕昌县| 渭源县|