官术网_书友最值得收藏!

VirtualBox

VirtualBox is a program that will allow us to install machines, just like normal computers, inside our own machine. We will have one computer, and we will install other computers inside it, acting as virtual machines. These are very important in terms of penetration testing; we're going to be using them a lot in order to set up a lab. It's very important to note that a virtual machine is just like a completely separate, working machine; there is nothing we will lose by installing an operating system as a virtual machine, and it will perform just like it does when installed on a separate laptop. Basically, instead of having four or five computers or laptops around us (so that we can try to hack into them), we're going to install them as virtual machines inside our own machine. This might seem a bit vague now, but once we get further into the chapter, the concept of how VirtualBox works will become clearer.

Basically, we are going to have three computers inside our main computer. We will have the following three machines in our lab:

  • Attacker machine: Kali Linux
  • Victim 1: Metasploitable
  • Victim 2: Windows

For example, if our main computer has macOS, we are not going to do anything with that. We have a machine that will be an attacker machine, running Kali Linux, and we will learn more about Kali Linux in a later part of this chapter.

We will also have two victims:

  • A victim that runs on Windows.
  • A victim that runs an operating system called Metasploitable.

So, we're going to have our own machine, and then have three separate machines inside it. This will be possible by using VirtualBox.

主站蜘蛛池模板: 辽宁省| 武夷山市| 巨野县| 杭锦后旗| 河源市| 清水县| 青海省| 河曲县| 贺兰县| 福清市| 杭锦后旗| 苏州市| 晋城| 雅安市| 芮城县| 防城港市| 临澧县| 大埔区| 承德市| 康平县| 新乡市| 郸城县| 广州市| 景谷| 蓬莱市| 白水县| 沭阳县| 博野县| 弥渡县| 泰和县| 蒙城县| 河北区| 白玉县| 浮梁县| 大城县| 嘉兴市| 蓬安县| 斗六市| 余干县| 湟源县| 高台县|