- Learn Ethical Hacking from Scratch
- Zaid Sabih
- 370字
- 2021-07-16 18:07:25
Installing Windows
The last machine that we're going to talk about installing is the Windows machine. This is just a normal Windows machine, with Windows 10. This is going to be another victim, and we are going to see how we can hack it. Again, we installed Metasploitable because it has a large number of vulnerabilities, and it's designed to be hacked into. It has a Terminal that is not very user friendly, and it doesn't really mimic a normal user. The Windows machine, on the other hand, will be used for scenarios that mimic a normal user, a user just using Windows to browse the internet or do whatever normal people do on their machines.
So, Microsoft has actually released free versions, or free virtual machines, that you can download and use. These are available on Microsoft's website. You can download them at https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/.
So, we're going to create a new machine, through the following steps:
- Make sure that you select which host operating system you have. If you have Windows, you click on the Windows tab, and if you have Mac, then click on the Mac tab, and so on.
- From the drop-down boxes, select MSEdge on Win (10), and make sure to select the VirtualBox image. These are all applications that allow us to install virtual machines. At the moment, we're using VirtualBox for everything, so just make sure you use the VirtualBox image. Once you do that, you will have a ZIP file named MSEdge.Win10.VirtualBox.zip. Uncompress it, and you will get the file MSEDGE-Win10TH2.ova.
- Double-click on the .ova file, and VirtualBox will ask you to import the machine—it has already set up the settings for it. You can now import it the way it is, and modify the settings later and the Windows will be installed.
- Before booting it, modify the settings, change RAM to 2 GB. We can then start it. Windows will start straight away—it is ready, given to us by Microsoft.
We have a fully working Windows machine here, Windows 10, and this will be the third machine that we use in our lab. It will be our second attacking machine—our second victim or target machine.
- 電力線通信技術(shù)
- 通信網(wǎng)絡(luò)設(shè)備
- 通信專業(yè)綜合能力(中級)
- 彩色電視機(jī)檢測數(shù)據(jù)及信號波形實(shí)修實(shí)查大全
- 天線測量實(shí)用手冊(第2版)
- 半導(dǎo)體光電子學(xué)
- 精通Android 5 多媒體開發(fā)
- 光纖通信(第4版)
- 電子對抗原理
- 石墨烯傳感器及其在物聯(lián)網(wǎng)中的應(yīng)用
- PTN分組傳送設(shè)備組網(wǎng)與實(shí)訓(xùn)(第2版)
- MIMO-OFDM技術(shù)原理
- 電子電路知識與實(shí)踐課堂
- 移動終端安全關(guān)鍵技術(shù)與應(yīng)用分析
- WCDMA基站維護(hù)教程