Categories
How To...

How To setup & configure VirtualBox for Pentesting

VirtualBox is one of the most popular Virtual Machine Hypervisors used by Penetration Testers and Ethical Hackers. In this ‘How To’ we have put together a selection of articles covering the setup and configuration of this software for Cyber Security-related purposes.

VirtualBox is a virtualization software package, by Oracle, for x86 and AMD64/Intel64 based platforms.

It can be installed on Windows, Linux, macOS, and Solaris as a Host operating system plus has the added advantage of being Free-Of-Charge.

Supported Guest operating systems include Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7, Windows 8, Windows 10), DOS/Windows 3.x, Linux (2.4, 2.6, 3.x and 4.x), Solaris & OpenSolaris, OS/2, and OpenBSD.

For more information about VirtualBox please take a look at their documentation Wiki which can be found here. Host platform packages together with the User Manual and sources can be found on their Downloads page.

Useful Articles

Below is a number of useful articles that cover the setup and configuration of VirtualBox for a range of Pentesting scenarios:

Are there any VirtualBox-related ‘How To’ articles that should be in the above list? If so please comment below and share it with our readers.

Leave a Reply