- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 345字
- 2021-06-24 18:44:56
Virtualizing Kali Linux versus installing it on physical hardware
The popularity of virtualization software makes it an attractive option for installing your testing machine on a virtualized platform. Virtualization software provides a rich set of features at a low cost and removes the hassle of dual booting the machine. Another useful feature that most virtualization software packages provide is the cloning of virtual machines that you can use to create multiple copies of the same machine. In a real-world penetration test, you might need to clone and duplicate your testing machine in order to install additional hacking tools and to make configuration changes in Kali Linux, keeping a copy of the earlier image to be used as a base image in a virtualized environment. This can be achieved very easily.
Some virtualization software have a revert to snapshot feature, wherein, if you mess up your testing machine, you can go back in time and restore a clean slate on which you can do your work.
Modifying the amount of RAM, size of a virtual disk, and number of virtual processors assigned to a virtual machine when required is another well-known feature of virtualization software.
Along with the features that make a virtualization platform such an attractive option comes one major drawback. If the penetration test involves testing the strength of the password used on the network or another processor-intensive task, you will need a high-performing processor and a GPU dedicated to that task. Cracking passwords on a virtual platform is not a wise thing to do, as it slows down the process and you won't be able to use the processor to its maximum capacity due to the virtualization overhead.
Another feature of a virtualization platform that confuses a lot of people is the networking options. Bridged, Host-only, and NAT are the three major networking options that virtualization software provide. Bridged networking is the recommended option for performing a penetration test, as the virtual machine will act as if it is connected to a physical switch and packets move out of the host machine unaltered.
- 零起點(diǎn)學(xué)Linux系統(tǒng)管理
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- Windows Server 2012 Hyper-V:Deploying the Hyper-V Enterprise Server Virtualization Platform
- Linux Mint Essentials
- Linux實(shí)戰(zhàn)
- Arch Linux Environment Setup How-to
- 玩到極致 iPhone 4S完全攻略
- Linux操作系統(tǒng)應(yīng)用編程
- 網(wǎng)絡(luò)操作系統(tǒng)管理與應(yīng)用(第三版)
- Windows 7中文版從入門到精通(修訂版)
- 無蘋果不生活 The New iPad隨身寶典
- 從實(shí)踐中學(xué)習(xí)Kali Linux無線網(wǎng)絡(luò)滲透測試
- 深入淺出Node.js
- 云原生落地:產(chǎn)品、架構(gòu)與商業(yè)模式
- OpenSolaris設(shè)備驅(qū)動原理與開發(fā)