Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

PROJECT SECTION 1 DETAILS: The first part of your project consists of preparing and deploying your testing tools (the attack OS) and the vulnerable host

image text in transcribed
image text in transcribed
PROJECT SECTION 1 DETAILS: The first part of your project consists of preparing and deploying your testing tools (the attack OS) and the vulnerable host that will serve as your attack target. Instead of requiring the use of two physical machines, we will utilize one physical machine and we vill leverage virtualization software to install a hypervisor (VirtualBox, /Mware, etc.) along with two (2) "guest" operating systems. For those new o virtualization, we are simply using our "host OS" (Window, Mac, Linux) and nstalling a virtualization "software application" that then allows us to run multiple OS'es on our "host OS" very quickly and easily. Many options xist that provide virtualized solutions, e.g., cloud-based (Amazon Web Services, Microsoft Azure, DigitalOcean, and many, many others) or local instances on our machines. Some hypervisors run as the "host OS" (bare metal' like VMware ESXi - common in enterprise environments) or as hosted applications like VMware Fusion/Workstation, or Oracle VirtualBox. First you decide which "free" virtualization software you vant to install (VMware or Oracle) - some may already have a preference, eel free to explore both options. If you are undecided, go with VMware. As mentioned earlier, you have two options to choose from: Option 1 - Local Lab 1. Virtualization Software. Choose your virtualization software (either works fine and they are both free)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Business Intelligence

Authors: Efraim Turban, Ramesh Sharda, ...more

2nd Edition

013610066X, 9780136100669

More Books

Students also viewed these General Management questions

Question

What are the four types of corruption?

Answered: 1 week ago

Question

Discuss whether self-actualization should be everyones goal.

Answered: 1 week ago