Virtual Machines: Difference between revisions
From SecurityTools
Added Hypervisors sub-section. Set up initial links to tool documentation pages. |
m Correct name and link for Oracle VirtualBox |
||
| Line 18: | Line 18: | ||
* [[VMWare|VMWare Fusion]] | * [[VMWare|VMWare Fusion]] | ||
* [[VMWare|VMWare VSphere withESXi]] | * [[VMWare|VMWare VSphere withESXi]] | ||
* [[VirtualBox]] | * [[Oracle VirtualBox]] | ||
* [[Hyper-V|Microsoft Hyper-V]] | * [[Hyper-V|Microsoft Hyper-V]] | ||
* [[KVM]] | * [[KVM]] | ||
* [[Virtual PC|Windows Virtual PC]] | * [[Virtual PC|Windows Virtual PC]] | ||
* [[Parallels]] | * [[Parallels]] | ||
Revision as of 00:37, 4 November 2021
Many vendors provide downloadable virtual machines to use as practice targets or as attack hosts. Below are a collection of systems you can download and run on your primary system.
- Metasploitable
- Metasploitable 2
- Metasploitable 3
- Kali
- Parrot OS
- Windows
- OWASP Web Testing Environment
Hypervisors
In addition to the above-listed downloadable virtual machines (VMs), you will need some type of VM management tool. For more information on what a hypervisor is, please see this article from phoenixNAP. Below are the currently available hypervisors for managing your VMs.
