NETWORK
SECURITY
WORKING WITH VIRTUAL MACHINES
Purpose
Discussion
Main steps
1. Virtual Box Setup
Version 6.0.4
https://drive.google.com/drive/folders/19vLVkYBmFuz4J_Qih1IW_DIy-CC6-OgC
Step 1: Create a New VM in VirtualBox
Step 2: Provide a Name and Select the OS Type and Version
Name
Machine Folder
Operating System Type
Other
Memory (RAM)
Caution
Virtual Hard Disk
Step 3: Creating a New Virtual Machine: Hard Disk
Create
folder icon
Add
Create
Create Virtual Hard Disk Wizard
dynamically allocated file
fixed-size file
Step 4: Creating a New Virtual Machine: File Location and Size
Next
Create
2. Running Your Virtual Machine
Start
3. Start Your Virtual Machine First Time
First Start Wizard
Host Drive
5. Capturing and Releasing Keyboard and Mouse
Figure Host Key Setting on the Virtual Machine Task Bar
keyboard
mouse
5. Typing Special Characters
Ctrl+Alt+Delete
Ctrl+Alt+Backspace
Ctrl+Alt+Fx
Ctrl+Alt+Delete
o Input Keyboard
Insert
Ctrl+Alt+Delete Insert Ctrl+Alt+Backspace
Host key + Del Ctrl+Alt+Del
Host key + Backspace Ctrl+Alt+Backspace
Host key + Function key
Ctrl+Alt+Fx
Alt+Tab
6. Saving the State of the Machine
File Preferences Input
Close
Host key + Q
Closing Down a Virtual Machine
Save the machine state:
Send the shutdown signal.
Power off the machine:
Warning
restore the current
snapshot
Discard
7. Snapshots
List Snapshots
Current State
a. Taking, Restoring, and Deleting Snapshots
Take a snapshot
Take Snapshot Machine
List Snapshots
o Take
o Current State Take
Description
Current State
Figure Snapshots List For a Virtual Machine
Restore a snapshot
Restore
Note
VBoxManage
Delete a snapshot
Delete
Note
8. Removing and Moving Virtual Machines
Removing a VM.
Remove
Remove
Moving a VM.
Move
9. Cloning Virtual Machines
Move
Figure . The Clone Virtual Machine Wizard
Clone Virtual Machine
Clone
Snapshots
Name Path
Clone Type
Full Clone:
Linked Clone:
Snapshots
Everything:
Current Machine State and All Children:
MAC Address Policy:
Generate New MAC Addresses For All Network
Adapters
Keep Disk Names:
Keep Hardware UUIDs:
Clone