My Poor Victim VM
I say poor - this vm has malware run on it, gets reset to the secure snapshot image repeatedly, and I run exploits on this victim machine from a Kali instance. This isn’t just a victim machine however, it also has security tools downloaded for analyzing malware.
This post is about the virtual Windows XP machine that I have set up over time, adding reversing tools and security tools.
and several Vulnerable Apps for Ethical Hacking
- War-FTP and more…
How it started
I wanted a way to follow along with Practical Malware Analysis