Question
In this lab, you will learn how to install virtualization software, create a virtual machine (VM), and install a useful operating system for security (many
In this lab, you will learn how to install virtualization software, create a virtual machine (VM), and install a useful operating system for security (many open source and freeware tools are developed exclusively for Linux).
Many of the security tools we encounter include Linux in some way, shape, or form. It is imperative that you get comfortable with this operating system in order to do well in ethical hacking, forensics, and so forth. Using Linux is, in many ways, just as easy as using any other operating system.
For the purposes of this lab, we will:
1) Download and install VirtualBox from Oracle. There are other virtualization products that perform just as well, if not better than, VirtualBox (for example, VMware, Microsoft Virtual PC, Parallels, Xen, etc). However, VirtualBox is fairly easy to configure for those new to virtualization.
2) Create and configure a VM inside VirtualBox running Linux.
To show that you have properly installed everything, create a user with a username that reflects your first initial and last name;
4) Take a screen shot of your installed VM running some flavor of Linux and showing a terminal window. At the terminal, you have typed whoami, and the resulting info is the logged in user (i.e., your username).
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started