Chapter 2 : Set up the safe enviroment

The Structure of a Virtual Machine

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/1915d408-b897-4642-8326-ffca0b4a20c4/Untitled.png

Network Configurations:

Host-Only Networking : 🙅🏻‍♂️

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68fecf10-5670-44a8-bfcf-b10d53e73e6a/Untitled.png

Using multiple virtual machines

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/1232f39b-7f10-48a8-bf39-0cce24b3a7d7/Untitled.png

Connect Malware to the Internet NAT network