Virtual Machines: Difference between revisions
From SecurityTools
Added Hypervisors sub-section. Set up initial links to tool documentation pages. |
m Replace OWASP Web Application Testing Environment with OWASP Broken Web Applications Project, correct internal link. |
||
| (2 intermediate revisions by the same user not shown) | |||
| Line 9: | Line 9: | ||
* [[Parrot OS]] | * [[Parrot OS]] | ||
* [[Windows]] | * [[Windows]] | ||
* [[OWASP Web | * [[OWASP Broken Web Applications Project]] | ||
*[[FLARE VM]] | |||
=== Hypervisors === | === Hypervisors === | ||
| Line 18: | Line 19: | ||
* [[VMWare|VMWare Fusion]] | * [[VMWare|VMWare Fusion]] | ||
* [[VMWare|VMWare VSphere withESXi]] | * [[VMWare|VMWare VSphere withESXi]] | ||
* [[VirtualBox]] | * [[Oracle VirtualBox]] | ||
* [[Hyper-V|Microsoft Hyper-V]] | * [[Hyper-V|Microsoft Hyper-V]] | ||
* [[KVM]] | * [[KVM]] | ||
* [[Virtual PC|Windows Virtual PC]] | * [[Virtual PC|Windows Virtual PC]] | ||
* [[Parallels]] | * [[Parallels]] | ||
Latest revision as of 14:37, 24 September 2023
Many vendors provide downloadable virtual machines to use as practice targets or as attack hosts. Below are a collection of systems you can download and run on your primary system.
- Metasploitable
- Metasploitable 2
- Metasploitable 3
- Kali
- Parrot OS
- Windows
- OWASP Broken Web Applications Project
- FLARE VM
Hypervisors
In addition to the above-listed downloadable virtual machines (VMs), you will need some type of VM management tool. For more information on what a hypervisor is, please see this article from phoenixNAP. Below are the currently available hypervisors for managing your VMs.
