Skip to content
This repository has been archived by the owner on Apr 26, 2021. It is now read-only.

Latest commit

 

History

History
21 lines (17 loc) · 562 Bytes

index.rst

File metadata and controls

21 lines (17 loc) · 562 Bytes

Preparing the Guest

At this point you should have configured the Cuckoo host component and you should have designed and defined the number and the names of the virtual machines you are going to use for malware execution.

Now it's time to create such machines and to configure them properly. The following documentation details the entire setup guide for Windows-based Guests. For Linux Guests, please read :doc:`linux`.

.. toctree::

    creation
    requirements
    network
    agent
    saving
    cloning
    linux