﻿1
00:00:00,330 --> 00:00:03,600
‫This is the virtual machines architecture diagram.

2
00:00:04,460 --> 00:00:09,290
‫It will help you understand the network structure of the virtual machines that are installed in the

3
00:00:09,290 --> 00:00:11,390
‫laboratory environment of this court's.

4
00:00:12,640 --> 00:00:14,280
‫So let's have a look at the whole picture.

5
00:00:15,310 --> 00:00:21,940
‫Host, is your computer on the network that you access the Internet via Wi-Fi access point or a wired

6
00:00:21,940 --> 00:00:22,450
‫connection?

7
00:00:23,660 --> 00:00:30,550
‫You install one of the virtualization platforms such as VMware or Oracle Virtual Box on your host machine.

8
00:00:32,580 --> 00:00:37,080
‫So there are vulnerable machines that will be used as victims throughout this course.

9
00:00:38,080 --> 00:00:47,610
‫Kelly Lennox not exploitable to meet exploitable three, Windows seven, Windows 10 and a WASP Bway.

10
00:00:48,410 --> 00:00:55,160
‫And here we said the network mode to net network, and that connects all the vulnerable machines in

11
00:00:55,160 --> 00:00:56,030
‫the same network.

12
00:00:57,740 --> 00:01:04,670
‫Now, you may notice here there are similar net modes in virtual box network settings that mode and

13
00:01:04,670 --> 00:01:05,780
‫not network mode.

14
00:01:06,900 --> 00:01:13,860
‫So if you're going to use Oracle virtual Xbox, be sure to select Nat'l Network mode and then set the

15
00:01:13,860 --> 00:01:15,900
‫same network for each machine.

16
00:01:16,990 --> 00:01:22,870
‫That way, the virtual machines will be on the same network and they can be accessed from one to the

17
00:01:22,870 --> 00:01:23,100
‫other.

18
00:01:24,970 --> 00:01:29,080
‫Now, if you're going to use VMware, simply select nat'l mode.

