Virtual Machines: Difference between revisions
From SecurityTools
(Added FireEye's FLARE VM machine) |
m (Replace OWASP Web Application Testing Environment with OWASP Broken Web Applications Project, correct internal link.) |
||
Line 9: | Line 9: | ||
* [[Parrot OS]] | * [[Parrot OS]] | ||
* [[Windows]] | * [[Windows]] | ||
* [[OWASP Web | * [[OWASP Broken Web Applications Project]] | ||
*[[FLARE VM]] | *[[FLARE VM]] | ||
Latest revision as of 07:37, 24 September 2023
Many vendors provide downloadable virtual machines to use as practice targets or as attack hosts. Below are a collection of systems you can download and run on your primary system.
- Metasploitable
- Metasploitable 2
- Metasploitable 3
- Kali
- Parrot OS
- Windows
- OWASP Broken Web Applications Project
- FLARE VM
Hypervisors[edit | edit source]
In addition to the above-listed downloadable virtual machines (VMs), you will need some type of VM management tool. For more information on what a hypervisor is, please see this article from phoenixNAP. Below are the currently available hypervisors for managing your VMs.