- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Kevin Cardwell
- 223字
- 2021-07-16 11:42:11
Converting from a physical to virtual environment
Another option in many of the tools that can be used to help us when we create machines is the physical to virtual functionality, sometimes referred to as the P2V concept; furthermore, this provides us with the capability to build any machine, run the conversion process to take the physical machine, and then convert it to a virtual machine. This functionality allows you to build a custom pentesting platform machine and then perform the conversion and carry the machine anywhere you go out in the field. We have a couple of options that we will discuss. There is a free option that we can use provided by VMware called vCenter Converter. With this tool, you can convert not only physical Windows machines, but also Linux. To try it out and see how well it works, you can download it from http://www.vmware.com/products/converter/. We have another option, that is, use the feature from our VMware Workstation installation. This is our preferred option. If you open the software, you will see there is an option to convert a physical machine to virtual, and this option is called Virtualize a Physical Machine…. Note that here you will have to install the converter the first time you select the option within VMware Workstation, as shown in the following screenshot:

- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- CSO進階之路:從安全工程師到首席安全官
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實踐
- 等級保護測評理論及應(yīng)用
- Getting Started with FortiGate
- 黑客攻防與無線安全從新手到高手(超值版)
- 模糊測試:強制發(fā)掘安全漏洞的利器
- Testing and Securing Android Studio Applications
- 網(wǎng)絡(luò)安全設(shè)計、配置與管理大全
- 黑客攻防實戰(zhàn)從入門到精通
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Mastering Python for Networking and Security
- Hands-On Artificial Intelligence for Cybersecurity
- 網(wǎng)絡(luò)安全監(jiān)控實戰(zhàn):深入理解事件檢測與響應(yīng)