Skip to content
This repository has been archived by the owner on Apr 26, 2021. It is now read-only.

Latest commit

 

History

History
19 lines (14 loc) · 420 Bytes

index.rst

File metadata and controls

19 lines (14 loc) · 420 Bytes

Preparing the Guest

At this point you should have configured Cuckoo host component and you should have designed and defined the number and the names of the virtual machines you are going to use for malware execution.

Now it's time to create such machines and to configure them properly.

creation requirements network agent saving cloning