- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Kevin Cardwell
- 423字
- 2021-07-16 11:42:11
Image conversion
Recently, while working with developing labs for a client who extensively used a virtual environment, I was asked to migrate the virtual machines from VMware to Hyper-V. As I had very little experience with Hyper-V, it was a challenging task which took three weeks to complete. Satisfaction is one aspect of life which is achieved when we accept challenges and overcome the hurdles posed by them.
Additionally, there were some things that worked perfectly fine in VMware but could not be accomplished in Hyper-V; one thing that would not work is the router emulation software. The primary issue with the migration is related to the virtual-hard-disk format. Hyper-V requires VHD and VMware uses the VMDK format for its virtual machine hard disks. In order to overcome the hurdle of image conversion, I was in search of a tool which would assist in this conversion.
Fortunately, such a tool exists, and it's free! When you are building virtual machines, if you want to use another tool, or more commonly you have a format that you created or downloaded and it does not match the tool you are trying to use, then this tool is perfect for you! The tool I use often for accomplishing this is Starwind V2V Converter from Starwind Software, available at http://www.starwindsoftware.com/.
A note of caution here: the tool in my experience has not been perfect, but it has converted most of the VMDK files to the VHD format for Hyper-V without any problems. The only OS which has been posing problems during conversion and then getting it to work on Hyper-V has been "FreeBSD". Ironically, FreeBSD versions prior to Version 9x seem to work fine.
You can download the software from http://www.starwindsoftware.com/converter. Note that you will be required to register and the application runs in Windows. Once you have downloaded the software, install it and then run the program. It is an easy-to-use tool; you select the file image to convert by navigating to it. Following this, the tool will display the options for the format output. An example of this is shown in the following screenshot:

Once the output format has been selected, the process of conversion will run, and once it is finished, you only need to go through the steps that we have covered before for the tool that you have chosen. As discussed, the tool works very well and it saves a lot of time and provides you the ability to pick and choose any platform that you prefer for building the pentesting environments.
- 網(wǎng)絡安全與管理
- Kali Linux CTF Blueprints
- 計算機使用安全與防護
- Penetration Testing with Perl
- 數(shù)字安全藍皮書:本質屬性與重要特征
- Mastering Kali Linux for Advanced Penetration Testing
- 反黑命令與攻防從新手到高手(微課超值版)
- 模糊測試:強制發(fā)掘安全漏洞的利器
- 網(wǎng)絡安全技術與實訓(第4版)(微課版)
- 人工智能安全(精裝版)
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- CTF快速上手:PicoCTF真題解析(Web篇)
- BeagleBone for Secret Agents
- 計算機網(wǎng)絡安全與應用技術(第2版)
- 互聯(lián)網(wǎng)域名國際化與安全技術導論