The document discusses setting up a virtual testing environment using VMware ESXi. It provides information on hardware requirements, virtualization platform options, and how to install and configure VMware ESXi. It also discusses obtaining offensive, forensic, vulnerability and virtual appliance distributions and converting them to a format compatible with the ESXi hypervisor. The goal is to help security professionals practice their skills using a virtual lab environment to increase their knowledge and make them more attractive candidates for information security jobs.
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Tom Moore
The document discusses setting up a virtual testing environment for security assessments. It recommends candidates obtain hands-on experience through virtual labs to supplement degrees and certifications. The document outlines hardware requirements, virtualization platform options like VMware ESXi, and provides step-by-step instructions to install ESXi and create a Windows management VM. It also discusses obtaining offensive, forensic, vulnerability, and virtual appliance distributions and converting them to the ESXi format to test skills in a safe, isolated environment.
Virtualizing citrix access gateway step by steprcrusco
The purpose of this document is to outline the process of Virtualizing Citrix Access Gateway with VMware workstation to enable the creation of a testing environment. There is a valid need to have a testing environment from which to work within without affecting the development, validation, and production environments.
The creation of a testing environment is not always possible when it comes to products that fall into the appliance category, as they are usually coded to only work with custom hardware or they are embedded into the device. The Citrix Access Gateway is one of those appliances that is based off on operating system, and is built on a generic hardware appliance, a standard OEM computer. The fact that it is based on standard OEM computer hardware allows us the opportunity to utilize virtualization as an option to install the Citrix Access Gateway onto a virtual machine.
It is not the intention of this document to violate any license agreement that may exist with any product, but it is intended to facilitate the ability of creating a testing environment. Testing environments allow one to evaluate a product, test changes, and to make decisions on whether to purchase more appliances based on those evaluations and tests.
This document outlines the procedure for installing the Citrix Access Gateway on a Virtual Machine with VMware Workstation. As of the writing of this document, this procedure has been successfully completed and tested using VMware Workstation 5.0, 5.5, and VMware Server (formally known as GSK).
The procedure outlined in this document was created to address to a couple of different thought processes, to create a list of steps that one could go through like a checklist and to create a pictorial list of steps that one could look through step by step. Everyone thinks differently and digests information differently; hopefully we have presented the steps in this document to accommodate those differences.
Using Virtualization To Improve Development And Testingelliando dias
Using virtualization can improve software development and testing by providing benefits like simplified administration, increased hardware utilization through server consolidation, and decreased provisioning times. Virtualization allows for scenarios like setting up test environments, simulating multiple clients, and rapid setup/teardown of test environments. Best practices for managing performance include profiling applications, monitoring resource usage, and treating virtual machines like physical machines for maintenance purposes.
Virtualization technology "comparison vmware 9 vs virtualbox 4.2"Lagendary Sheeva
This document compares VMware Workstation and VM VirtualBox virtualization software. It provides information on their host system requirements including supported processors, memory requirements, display and storage requirements. Key features of VMware Workstation 9 such as support for Windows 8, restricted virtual machines, and downloading VMs from vSphere are summarized. The steps to install VMware Workstation 9 on Windows 7 are outlined at a high level.
This document provides an overview of virtualization security topics. It discusses various virtualization threats including guest VM attacks, hypervisor attacks, and management API attacks. Specific vulnerabilities are also mentioned, such as directory traversal issues and buffer overflows in hypervisor components like the virtual floppy disk controller. Attack methods like privilege escalation, denial of service, and taking control of the hypervisor are covered at a high level.
The document provides guidance on preparing to create a new virtual machine in VMware Workstation. Key steps include selecting a typical or custom configuration, choosing a hardware compatibility setting, selecting a guest operating system installer, providing information for automated installation, specifying a virtual machine name and file location, selecting the number of processors and allocating memory, and choosing a network connection type. Following these steps helps ensure the new virtual machine is properly configured before creation.
1. The presentation discusses separating fact from fiction regarding virtualization security threats such as VM escape scenarios. While theoretically possible, VM escape is very difficult to achieve due to VMware's isolation techniques and security practices.
2. Operational security threats from issues like weak passwords, lack of patching, and overprivileged user accounts are identified as more likely and higher impact risks. Least privilege approaches like RBAC and workflow-based policies are recommended to mitigate these risks.
3. Attendees are encouraged to adopt security best practices like isolating management networks, embracing micro-segmentation with NSX, and keeping ESXi systems up-to-date with patches. Questions are taken at the end.
VMWare allows restoration of forensic images into virtual machines. This allows examination of a suspect's system and networking of multiple restored systems in an isolated virtual environment. The document outlines the process to install VMWare, restore an image as a virtual drive using a tool like ILook, and configure the virtual network. Restoring additional systems like clients and examining the restored network can provide investigative insights while isolating the virtual systems from external networks.
The document provides details about installation, upgrade, hardware requirements, supported operating systems and databases for VMware ESX Server 3.0.1 and Virtual Center 2.0.1. It discusses the major components, minimum hardware requirements for VirtualCenter Server and Virtual Infrastructure Client. It also lists the supported databases, file extensions, differences between ESX and GSX, current ESX hardware version and various virtualization products.
This document provides an introduction to 100 questions about planning, installing, and managing VMware Server, Workstation, and ESX. It aims to answer the most common questions asked in forums and by customers. Each section addresses a different aspect of VMware and virtualization to help users become more successful with VMware products and solutions.
Bryan Nairn discusses security considerations for virtualization. He notes that over 40% of virtual machines will be less secure than physical machines by 2014. The document outlines common virtualization security myths and describes the hypervisor architecture. It discusses isolation between virtual machines and the hypervisor's security goals of protecting data confidentiality and integrity. The document also covers common attack vectors and provides potential solutions for securing the host system and virtual machines.
The document contains 15 technical interview questions for a third round VMware interview at IBM. The questions cover topics such as the physical topology of vSphere infrastructure, configuration of clusters, hosts, and resource pools, advantages of resource pools, benefits of ESX over other VMware products, management methods for vSphere, differences in access methods, features of VMFS, supported datastore types, configuration of datastores, VMware Consolidated Backup, configuration of vSphere HA and DRS, experience with VM provisioning, alarm and event management, task scheduling, hardware compatibility lists, configuration of SANs and NAS with VMware, applications run on VMs, and troubleshooting ESX and vSphere server crashes.
The document provides information about troubleshooting VMware App Volumes, including where to find relevant log files and events. It discusses log files from the App Volumes Manager, App Volumes Agent, ESXi host, and SQL database. It also provides examples of issues like the SQL database becoming unreachable, Active Directory becoming unreachable, and the vCenter server becoming unreachable. The document describes how to use the Ruby console and PowerShell to help troubleshoot the App Volumes Manager.
Prepare and Manage Remote Applications through Virtualization Rubal Sagwal
Prepare and manage remote applications:
-Configuring application sharing
-Package applications for deployment by using RemoteApp
-Installing and configuring the RD Session Host Role Service on the server
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamSymantec
Virtualization in enterprises has been a growing trend for years, offering attractive opportunities for scaling, efficiency, and flexibility. According to Forrester Research1, over 70 percent of organizations are planning to use server virtualization by the end of 2015.
Often, companies delay implementing virtualization due to security concerns or adopt virtualization before deploying advanced security measures. However, virtual machines and their hosting servers are not immune to attack. Introducing virtualization technology to a business creates new attack vectors that need to be addressed, such as monitoring the virtual networks between virtual machines. We have seen malware specifically designed to compromise virtual machines and have observed attackers directly targeting hosting servers. Around 18 percent of malware detects virtual machines and stops executing if it arrives on one.
Virtual systems are increasingly being used to automatically analyze and detect malware. Symantec has noticed that attackers are creating new methods to avoid this analysis. For example, some Trojans will wait for multiple left mouse clicks to occur before they decrypt themselves and start their payload. This can make it difficult or impossible for an automated system to come to an accurate conclusion about the malware in a short timeframe. Attackers are clearly not ignoring virtual environments in their plans, so these systems need to be protected as well.
Virtualization using VMWare WorkstationHitesh Gupta
Virtualization allows multiple operating systems to run concurrently on a single physical machine. VMware is a leading virtualization software that allows this. The document discusses virtualization concepts like emulation, virtual machines, types of virtualization. It provides an overview of VMware Workstation software for desktop virtualization. Steps for installing Workstation and creating a virtual machine are outlined. Networking modes for virtual machines are explained. The document also discusses how virtualization intersect with cloud computing. It presents a case study of how Oxford University implemented a private cloud using VMware virtualization to provide database as a service for researchers.
Using EMC VNX storage with VMware vSphereTechBookEMC
This document provides an overview of using EMC VNX storage with VMware vSphere. It covers topics such as VNX technology and management tools, installing vSphere on VNX, configuring storage access, provisioning storage, cloning virtual machines, backup and recovery options, data replication solutions, data migration, and monitoring. Configuration steps and best practices are also discussed.
Security Best Practices For Hyper V And Server Virtualizationrsnarayanan
The document summarizes information about Hyper-V virtualization. It provides an overview of Hyper-V architecture, including that the hypervisor partitions the hardware and manages guest partitions through the virtualization stack. It also discusses Hyper-V security, noting that guests are isolated from each other and the root to prevent attacks, and that delegated administration and role-based access control can be used to manage virtual machine access.
This document provides instructions for creating virtual machines in VMware Workstation:
- It describes understanding virtual machines and preparing to create one by selecting a configuration, hardware compatibility setting, guest operating system, virtual machine name and files, number of processors, and allocating memory.
- It outlines how to create a new virtual machine using the New Virtual Machine wizard and how to clone, import, or virtualize an existing physical machine.
- It also covers installing and upgrading VMware Tools in virtual machines.
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....Denis Gundarev
Imagine that you just found the new job of your dreams: You are now a system administrator in a large enterprise. Everything is going like clockwork, except for one major problem: There are 5 different versions of Presentation Server in use and there is no documentation for any system. Now imagine you are a consultant ready to do an assessment of Citrix infrastructure, but nobody in the company knows how many farms and servers exist, or how they are configured. (Wanting a new imaginary job yet?) In this session, Denis Gundarev will share tips on how to document infrastructure and tricks on how to find all components or users that are "forgotten." Attendees will learn several methods for elevating permissions and taking ownership of forgotten systems.
This document provides sample interview questions for a VMware L3 Administrator position. It includes questions about daily activities, differences between VMware and Hyper-V, troubleshooting errors, port usage, commands, features like DRS and HA, storage types, and more technical configuration topics. A follow-up section provides additional questions for later rounds of an IBM technical interview, focusing on virtual infrastructure topology, cluster configuration, resource pools, ESX implementation advantages, management methods, datastore types, backup processes, and work experience. The document also provides steps for increasing a VMFS volume size in vSphere.
VMware is transitioning its hypervisor architecture to exclusively use ESXi starting with the next release of vSphere. ESXi provides improvements over the previous ESX architecture such as a smaller code footprint that requires fewer patches, improved security since it runs without a separate operating system, and more streamlined deployment and management. The presented document reviews the architectural differences between ESX and ESXi, hardware monitoring and management capabilities in ESXi, security features, deployment options, command line interfaces, diagnostic tools, and addressing common questions about the transition.
This document summarizes the configuration maximums for VMware vSphere 4.1, including:
- Virtual machine maximums such as 8 vCPUs per VM and 255GB RAM.
- ESX host maximums like 512 vCPUs and 1TB RAM per host, and 320 VMs per host.
- vCenter server maximums of 1000 hosts, 10000 powered on VMs, and 100 concurrent clients.
- It provides tables of numerical limits for computing resources, memory, storage, networking, resource pools, and clusters.
The document notes that exceeding some individual maximums may require increasing host memory pools, and that maximum values across multiple configuration options together may cause host disconnects
The document provides instructions for creating a Windows PE disk that can be used for troubleshooting, capturing Windows XP WIM images, and deploying those images. It outlines requirements like the Windows Automated Installation Kit (WAIK) and lists steps for building a basic Windows PE disk, including mounting the Windows PE boot image as a folder to add tools and files. It also describes options for customizing the Windows PE disk, such as installing additional support packages, and notes that the Windows PE environment has limited functionality compared to a full Windows installation. The overall goal is to create a portable boot disk that allows technicians to perform tasks like capturing WIM images from a Windows XP system using tools included in Windows PE.
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...Benjamin Delpy
This talk will focus on the how Windows authentication works in the real world and what are the popular attacks against it. You will learn the thought process of attackers in the real world and how it differs from a defender’s perspective. We’ll also cover post-exploitation tools and techniques such as Mimikatz. Finally, we’ll discuss next steps – How do you design services that are breach-resistant and make authentication harder to crack.
The document discusses various topics related to VMware administration interview questions and answers. It covers topics such as the VMkernel, port groups, vMotion licensing, virtual switches, snapshots, converting physical machines to virtual machines, and VMware consolidated backup.
This document provides guidance on how to configure VMware ESX hosts to pass a security audit. It discusses securing the ESX service console, virtual machines, networks, logging and alerts. Specific recommendations include enabling directory authentication, limiting root access, configuring firewalls and NTP, and replacing self-signed certificates with CA-signed ones. The document also warns of common security issues with virtualization like lack of intra-ESX networking controls and potential for collocating VMs that should be isolated.
The document summarizes the history and development of the Middle Colonies, which included New York, New Jersey, Pennsylvania, and Delaware. It describes how New York originated as the Dutch colony of New Netherland, before being captured by the English and becoming a proprietary colony. New Jersey was formed from land given to English nobles from New York. Pennsylvania was founded by William Penn as a place for Quakers to practice their religion freely. Delaware broke off as a separate colony from Pennsylvania. The Middle Colonies attracted settlers from various European backgrounds and had economies focused on farming, trade, and shipbuilding.
The document provides details about installation, upgrade, hardware requirements, supported operating systems and databases for VMware ESX Server 3.0.1 and Virtual Center 2.0.1. It discusses the major components, minimum hardware requirements for VirtualCenter Server and Virtual Infrastructure Client. It also lists the supported databases, file extensions, differences between ESX and GSX, current ESX hardware version and various virtualization products.
This document provides an introduction to 100 questions about planning, installing, and managing VMware Server, Workstation, and ESX. It aims to answer the most common questions asked in forums and by customers. Each section addresses a different aspect of VMware and virtualization to help users become more successful with VMware products and solutions.
Bryan Nairn discusses security considerations for virtualization. He notes that over 40% of virtual machines will be less secure than physical machines by 2014. The document outlines common virtualization security myths and describes the hypervisor architecture. It discusses isolation between virtual machines and the hypervisor's security goals of protecting data confidentiality and integrity. The document also covers common attack vectors and provides potential solutions for securing the host system and virtual machines.
The document contains 15 technical interview questions for a third round VMware interview at IBM. The questions cover topics such as the physical topology of vSphere infrastructure, configuration of clusters, hosts, and resource pools, advantages of resource pools, benefits of ESX over other VMware products, management methods for vSphere, differences in access methods, features of VMFS, supported datastore types, configuration of datastores, VMware Consolidated Backup, configuration of vSphere HA and DRS, experience with VM provisioning, alarm and event management, task scheduling, hardware compatibility lists, configuration of SANs and NAS with VMware, applications run on VMs, and troubleshooting ESX and vSphere server crashes.
The document provides information about troubleshooting VMware App Volumes, including where to find relevant log files and events. It discusses log files from the App Volumes Manager, App Volumes Agent, ESXi host, and SQL database. It also provides examples of issues like the SQL database becoming unreachable, Active Directory becoming unreachable, and the vCenter server becoming unreachable. The document describes how to use the Ruby console and PowerShell to help troubleshoot the App Volumes Manager.
Prepare and Manage Remote Applications through Virtualization Rubal Sagwal
Prepare and manage remote applications:
-Configuring application sharing
-Package applications for deployment by using RemoteApp
-Installing and configuring the RD Session Host Role Service on the server
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamSymantec
Virtualization in enterprises has been a growing trend for years, offering attractive opportunities for scaling, efficiency, and flexibility. According to Forrester Research1, over 70 percent of organizations are planning to use server virtualization by the end of 2015.
Often, companies delay implementing virtualization due to security concerns or adopt virtualization before deploying advanced security measures. However, virtual machines and their hosting servers are not immune to attack. Introducing virtualization technology to a business creates new attack vectors that need to be addressed, such as monitoring the virtual networks between virtual machines. We have seen malware specifically designed to compromise virtual machines and have observed attackers directly targeting hosting servers. Around 18 percent of malware detects virtual machines and stops executing if it arrives on one.
Virtual systems are increasingly being used to automatically analyze and detect malware. Symantec has noticed that attackers are creating new methods to avoid this analysis. For example, some Trojans will wait for multiple left mouse clicks to occur before they decrypt themselves and start their payload. This can make it difficult or impossible for an automated system to come to an accurate conclusion about the malware in a short timeframe. Attackers are clearly not ignoring virtual environments in their plans, so these systems need to be protected as well.
Virtualization using VMWare WorkstationHitesh Gupta
Virtualization allows multiple operating systems to run concurrently on a single physical machine. VMware is a leading virtualization software that allows this. The document discusses virtualization concepts like emulation, virtual machines, types of virtualization. It provides an overview of VMware Workstation software for desktop virtualization. Steps for installing Workstation and creating a virtual machine are outlined. Networking modes for virtual machines are explained. The document also discusses how virtualization intersect with cloud computing. It presents a case study of how Oxford University implemented a private cloud using VMware virtualization to provide database as a service for researchers.
Using EMC VNX storage with VMware vSphereTechBookEMC
This document provides an overview of using EMC VNX storage with VMware vSphere. It covers topics such as VNX technology and management tools, installing vSphere on VNX, configuring storage access, provisioning storage, cloning virtual machines, backup and recovery options, data replication solutions, data migration, and monitoring. Configuration steps and best practices are also discussed.
Security Best Practices For Hyper V And Server Virtualizationrsnarayanan
The document summarizes information about Hyper-V virtualization. It provides an overview of Hyper-V architecture, including that the hypervisor partitions the hardware and manages guest partitions through the virtualization stack. It also discusses Hyper-V security, noting that guests are isolated from each other and the root to prevent attacks, and that delegated administration and role-based access control can be used to manage virtual machine access.
This document provides instructions for creating virtual machines in VMware Workstation:
- It describes understanding virtual machines and preparing to create one by selecting a configuration, hardware compatibility setting, guest operating system, virtual machine name and files, number of processors, and allocating memory.
- It outlines how to create a new virtual machine using the New Virtual Machine wizard and how to clone, import, or virtualize an existing physical machine.
- It also covers installing and upgrading VMware Tools in virtual machines.
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....Denis Gundarev
Imagine that you just found the new job of your dreams: You are now a system administrator in a large enterprise. Everything is going like clockwork, except for one major problem: There are 5 different versions of Presentation Server in use and there is no documentation for any system. Now imagine you are a consultant ready to do an assessment of Citrix infrastructure, but nobody in the company knows how many farms and servers exist, or how they are configured. (Wanting a new imaginary job yet?) In this session, Denis Gundarev will share tips on how to document infrastructure and tricks on how to find all components or users that are "forgotten." Attendees will learn several methods for elevating permissions and taking ownership of forgotten systems.
This document provides sample interview questions for a VMware L3 Administrator position. It includes questions about daily activities, differences between VMware and Hyper-V, troubleshooting errors, port usage, commands, features like DRS and HA, storage types, and more technical configuration topics. A follow-up section provides additional questions for later rounds of an IBM technical interview, focusing on virtual infrastructure topology, cluster configuration, resource pools, ESX implementation advantages, management methods, datastore types, backup processes, and work experience. The document also provides steps for increasing a VMFS volume size in vSphere.
VMware is transitioning its hypervisor architecture to exclusively use ESXi starting with the next release of vSphere. ESXi provides improvements over the previous ESX architecture such as a smaller code footprint that requires fewer patches, improved security since it runs without a separate operating system, and more streamlined deployment and management. The presented document reviews the architectural differences between ESX and ESXi, hardware monitoring and management capabilities in ESXi, security features, deployment options, command line interfaces, diagnostic tools, and addressing common questions about the transition.
This document summarizes the configuration maximums for VMware vSphere 4.1, including:
- Virtual machine maximums such as 8 vCPUs per VM and 255GB RAM.
- ESX host maximums like 512 vCPUs and 1TB RAM per host, and 320 VMs per host.
- vCenter server maximums of 1000 hosts, 10000 powered on VMs, and 100 concurrent clients.
- It provides tables of numerical limits for computing resources, memory, storage, networking, resource pools, and clusters.
The document notes that exceeding some individual maximums may require increasing host memory pools, and that maximum values across multiple configuration options together may cause host disconnects
The document provides instructions for creating a Windows PE disk that can be used for troubleshooting, capturing Windows XP WIM images, and deploying those images. It outlines requirements like the Windows Automated Installation Kit (WAIK) and lists steps for building a basic Windows PE disk, including mounting the Windows PE boot image as a folder to add tools and files. It also describes options for customizing the Windows PE disk, such as installing additional support packages, and notes that the Windows PE environment has limited functionality compared to a full Windows installation. The overall goal is to create a portable boot disk that allows technicians to perform tasks like capturing WIM images from a Windows XP system using tools included in Windows PE.
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...Benjamin Delpy
This talk will focus on the how Windows authentication works in the real world and what are the popular attacks against it. You will learn the thought process of attackers in the real world and how it differs from a defender’s perspective. We’ll also cover post-exploitation tools and techniques such as Mimikatz. Finally, we’ll discuss next steps – How do you design services that are breach-resistant and make authentication harder to crack.
The document discusses various topics related to VMware administration interview questions and answers. It covers topics such as the VMkernel, port groups, vMotion licensing, virtual switches, snapshots, converting physical machines to virtual machines, and VMware consolidated backup.
This document provides guidance on how to configure VMware ESX hosts to pass a security audit. It discusses securing the ESX service console, virtual machines, networks, logging and alerts. Specific recommendations include enabling directory authentication, limiting root access, configuring firewalls and NTP, and replacing self-signed certificates with CA-signed ones. The document also warns of common security issues with virtualization like lack of intra-ESX networking controls and potential for collocating VMs that should be isolated.
The document summarizes the history and development of the Middle Colonies, which included New York, New Jersey, Pennsylvania, and Delaware. It describes how New York originated as the Dutch colony of New Netherland, before being captured by the English and becoming a proprietary colony. New Jersey was formed from land given to English nobles from New York. Pennsylvania was founded by William Penn as a place for Quakers to practice their religion freely. Delaware broke off as a separate colony from Pennsylvania. The Middle Colonies attracted settlers from various European backgrounds and had economies focused on farming, trade, and shipbuilding.
Three vehicles departed from the States. Some pictures of fish were not sent by Lisa and Denny because Dad accidentally damaged his camera by submerging it in water. The writer hopes the recipient had an enjoyable experience.
The Age of Exploration began in the 1400s as Europeans developed new technologies like the compass, caravel ships, and the printing press which allowed them to learn more about distant lands. Explorers like Vasco de Gama and Christopher Columbus sought new trade routes and wealth for their sponsoring countries by exploring Africa and the Americas. Their voyages established contact between Europe, Africa, and the Americas and marked the rise of European empires in these regions.
These floral bud placemats were inspired by traditional Phulkari embroidery from Punjab, India. The placemats feature motifs and designs common in Phulkari work with colors and layouts adapted from that style. Sunpreet Kaur presented the placemats which were made in India using materials common for Phulkari embroidery and showed photos of the process from initial designs to the final products.
Red Teaming Your Bug-out Bag - Hack3rCon^4Tom Moore
The document discusses preparing a bug-out bag for survival situations lasting 72 hours or more. It focuses on selecting only the most useful, lightweight items. The talk covers the five C's of survival - cutting, cover, container, combustion, and cordage. For each category, several specific items are recommended to include in a bug-out bag based on their multifunctionality and ability to aid survival. Size, weight, cost, durability and shelf life of items are prioritized.
This document discusses a hand-embroidered cushion from India called a Gulkerian cushion. It was inspired by traditional Phulkari embroidery from Punjab, India and details the motifs, color palette, layouts, and materials used in its creation. The document shows the work in progress and presents the final embroidered cushion product.
Spanish conquistadors like Hernan Cortes and Francisco Pizarro explored and conquered the Aztec and Inca Empires in the early 1500s, taking their rulers prisoner and claiming the regions for Spain. They were able to defeat the powerful empires through advantages in weapons, horses, and diseases that killed many Native Americans. Spain went on to establish settlements, missions, and presidios across its American territories and implemented a strict social class system with Peninsulares at the top. Native Americans were initially enslaved through the encomienda system until laws were passed in the 1540s to protect their rights.
Este documento establece las obligaciones y procedimientos para el tránsito interno de mercancías importadas y exportadas por ferrocarril en México. Detalla los requisitos en las aduanas de inicio y destino, incluyendo la presentación de pedimentos, reconocimiento de contenedores, y verificación de mercancías. También especifica las rutas fiscales autorizadas y los plazos máximos para el traslado de mercancías entre aduanas.
Virtually Secure: Uncovering the risks of virtualizationSeccuris Inc.
Virtually Secure: Uncovering the risks of virtualization
Organizations have been quickly leveraging the benefits of virtualized platforms in their datacenters, often unknowingly increasing the exposure of their most prized assets.
Michael will highlight the key concerns around virtualization technologies including the answers to questions such as are virtualized servers PCI compliant and what minimum controls must exist to protect the hypervisor? He will walk the audience through the latest technical threats and shed light on the solutions and controls available to secure your virtual environments.
This document provides an overview of virtualization concepts from VMware's perspective given by Steven Aiello, including:
- A brief biography of Steven Aiello and his credentials.
- An introduction to common virtualization concepts such as VMs, hypervisors, and benefits of virtualization like hardware independence and infrastructure flexibility.
- A comparison of popular virtualization platforms including VMware, Citrix XenServer, Microsoft Hyper-V, and others.
- Discussion of how virtualization can both help and potentially hurt security through concepts like availability, confidentiality and integrity. Mitigation strategies are proposed.
Virtualization, A Concept Implementation of CloudNishant Munjal
This presentation will guide through deploying virtualization in linux environment and get its access to another machine followed by virtualization concept.
This document discusses virtualization software VMware. It provides an overview of VMware, including its history and products. VMware was founded in 1998 and launched its first product Workstation. It later released ESX Server. Today, VMware offers Workstation for desktop users and ESX for servers. The document also covers types of virtualization and provides tips for optimizing VMware performance.
Vtguru v mware-v-sphere-administration-trainingfosilalive2
This document outlines the modules and content covered in the VTguru VMware vSphere-4.1 Administration Training course. The course teaches students to install, configure, and manage VMware vSphere-4.1 which includes ESX Server and vCenter Server. Students will learn how to install and configure ESX Server and vCenter Server, manage virtual networks and storage, deploy and manage virtual machines, ensure high availability, and more. The course contains over 15 modules and covers all aspects of virtual infrastructure administration using VMware vSphere 4.1.
This document is a seminar report submitted by Ashwani Kumar to Cochin University of Science & Technology in partial fulfillment of the requirements for a Bachelor of Technology degree in Information Technology. The report discusses VMware virtualization, including an introduction to virtualization, the history and benefits of virtualization, virtual machines and hypervisors, different types of virtualization, and popular virtualization software. Key topics covered include server consolidation using virtualization, running multiple operating systems simultaneously in isolated virtual environments, and increasing hardware utilization through virtualization.
This document discusses virtualization and VMware vSphere. It begins by asking what virtualization is and how it works. It then discusses types of virtualization like host-based and bare-metal virtualization. Benefits of virtualization are also mentioned. The document goes on to discuss specific virtualization platforms like VMware ESXi, vCenter Server, and vSphere. It provides details on features of vSphere like resource management, high availability, live migration, and more. Finally, it discusses virtual machines and how the virtualization layer abstracts and manages access to physical hardware resources for VMs.
This document provides an overview of system virtualization. It defines virtualization as the abstraction of hardware resources into multiple execution environments. The benefits of virtualization include hardware independence, isolation, manageability and new opportunities like software as a service. The history of virtualization is discussed, along with hypervisor architecture and how hardware assists with virtualization. Considerations for virtualization like management complexity, pitfalls and skills requirements are also covered.
VMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS InstallGnanaKumarBitra1
This document provides an overview of VMware vSphere Install, Configure, Manage (ICM) certification and virtual machine concepts. It discusses the architectural differences between traditional, host-based, and bare-metal architectures. It also describes the benefits of using virtual machines such as easy relocation, easy management, and ability to support legacy applications. Additionally, it outlines the process for creating a virtual machine including pre-implementation steps, implementation procedure, and post-implementation steps. Finally, it lists some tasks for the lab including creating a VM, installing guest operating systems, and installing VMware tools.
virtualization presentation
Virtualization is the simulation of the software
and/or hardware upon which other software
runs. This simulated environment is called
virtual machine. Each VM can run its own
operating systems and applications as if it were
in a physical machine. So It is a way to run
multiple operating systems on the same
hardware at the same time.
VMotion allows you to quickly move an entire running virtual machine from one host to another without any downtime or interruption to the virtual machine This is also known as a “hot” or “live” migration
Virtualization allows multiple operating systems and applications to run on the same hardware at the same time by simulating virtual hardware. There are two main types of virtualization architectures: hosted, where a hypervisor runs on a conventional operating system; and bare-metal, where the hypervisor runs directly on the hardware. Virtualization can be applied to desktops, servers, networks, storage and applications. It provides benefits such as reduced costs, simplified management, and the ability to run multiple systems on one physical machine.
Virtualization allows sharing of hardware resources across multiple virtual machines. There are two main types of hypervisors - native/bare-metal hypervisors that run directly on hardware and hosted hypervisors that run as an application on a conventional OS. Virtualization can be applied at the hardware level through full or para virtualization, or at the application level. Popular virtualization products include VMware Workstation, Microsoft Hyper-V, and VMware ESX Server.
Virtual technology refers to creating virtual versions of computer hardware, operating systems, and other resources. Types of virtualization include server, application, presentation, network, and storage virtualization. Microsoft Hyper-V is a native hypervisor that can create virtual machines on Windows systems. To use Hyper-V, you install it in Windows features, open the Hyper-V Manager, configure networking like virtual switches, and create and install guest operating systems in new virtual machines.
The document discusses the history and future of virtual machines. It summarizes that virtual machines were originally developed in the 1960s for mainframe computers but fell out of favor. Modern virtualization technologies like VMware have enabled running multiple operating systems on commodity hardware simultaneously with good performance. The document outlines VMware's virtualization technology and products, and provides examples of how virtual machines can be used for testing, server consolidation, application compatibility, and security.
Adtran’s SDG 9000 Series brings high-performance, cloud-managed Wi-Fi 7 to homes, businesses and public spaces. Built on a unified SmartOS platform, the portfolio includes outdoor access points, ceiling-mount APs and a 10G PoE router. Intellifi and Mosaic One simplify deployment, deliver AI-driven insights and unlock powerful new revenue streams for service providers.
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....Jasper Oosterveld
Sensitivity labels, powered by Microsoft Purview Information Protection, serve as the foundation for classifying and protecting your sensitive data within Microsoft 365. Their importance extends beyond classification and play a crucial role in enforcing governance policies across your Microsoft 365 environment. Join me, a Data Security Consultant and Microsoft MVP, as I share practical tips and tricks to get the full potential of sensitivity labels. I discuss sensitive information types, automatic labeling, and seamless integration with Data Loss Prevention, Teams Premium, and Microsoft 365 Copilot.
UiPath Community Zurich: Release Management and Build PipelinesUiPathCommunity
Ensuring robust, reliable, and repeatable delivery processes is more critical than ever - it's a success factor for your automations and for automation programmes as a whole. In this session, we’ll dive into modern best practices for release management and explore how tools like the UiPathCLI can streamline your CI/CD pipelines. Whether you’re just starting with automation or scaling enterprise-grade deployments, our event promises to deliver helpful insights to you. This topic is relevant for both on-premise and cloud users - as well as for automation developers and software testers alike.
📕 Agenda:
- Best Practices for Release Management
- What it is and why it matters
- UiPath Build Pipelines Deep Dive
- Exploring CI/CD workflows, the UiPathCLI and showcasing scenarios for both on-premise and cloud
- Discussion, Q&A
👨🏫 Speakers
Roman Tobler, CEO@ Routinuum
Johans Brink, CTO@ MvR Digital Workforce
We look forward to bringing best practices and showcasing build pipelines to you - and to having interesting discussions on this important topic!
If you have any questions or inputs prior to the event, don't hesitate to reach out to us.
This event streamed live on May 27, 16:00 pm CET.
Check out all our upcoming UiPath Community sessions at:
👉 https://community.uipath.com/events/
Join UiPath Community Zurich chapter:
👉 https://community.uipath.com/zurich/
Neural representations have shown the potential to accelerate ray casting in a conventional ray-tracing-based rendering pipeline. We introduce a novel approach called Locally-Subdivided Neural Intersection Function (LSNIF) that replaces bottom-level BVHs used as traditional geometric representations with a neural network. Our method introduces a sparse hash grid encoding scheme incorporating geometry voxelization, a scene-agnostic training data collection, and a tailored loss function. It enables the network to output not only visibility but also hit-point information and material indices. LSNIF can be trained offline for a single object, allowing us to use LSNIF as a replacement for its corresponding BVH. With these designs, the network can handle hit-point queries from any arbitrary viewpoint, supporting all types of rays in the rendering pipeline. We demonstrate that LSNIF can render a variety of scenes, including real-world scenes designed for other path tracers, while achieving a memory footprint reduction of up to 106.2x compared to a compressed BVH.
https://arxiv.org/abs/2504.21627
Data Virtualization: Bringing the Power of FME to Any ApplicationSafe Software
Imagine building web applications or dashboards on top of all your systems. With FME’s new Data Virtualization feature, you can deliver the full CRUD (create, read, update, and delete) capabilities on top of all your data that exploit the full power of FME’s all data, any AI capabilities. Data Virtualization enables you to build OpenAPI compliant API endpoints using FME Form’s no-code development platform.
In this webinar, you’ll see how easy it is to turn complex data into real-time, usable REST API based services. We’ll walk through a real example of building a map-based app using FME’s Data Virtualization, and show you how to get started in your own environment – no dev team required.
What you’ll take away:
-How to build live applications and dashboards with federated data
-Ways to control what’s exposed: filter, transform, and secure responses
-How to scale access with caching, asynchronous web call support, with API endpoint level security.
-Where this fits in your stack: from web apps, to AI, to automation
Whether you’re building internal tools, public portals, or powering automation – this webinar is your starting point to real-time data delivery.
AI Emotional Actors: “When Machines Learn to Feel and Perform"AkashKumar809858
Welcome to the era of AI Emotional Actors.
The entertainment landscape is undergoing a seismic transformation. What started as motion capture and CGI enhancements has evolved into a full-blown revolution: synthetic beings not only perform but express, emote, and adapt in real time.
For reading further follow this link -
https://akash97.gumroad.com/l/meioex
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025Lorenzo Miniero
Slides for my "Multistream support in the Janus SIP and NoSIP plugins" presentation at the OpenSIPS Summit 2025 event.
They describe my efforts refactoring the Janus SIP and NoSIP plugins to allow for the gatewaying of an arbitrary number of audio/video streams per call (thus breaking the current 1-audio/1-video limitation), plus some additional considerations on what this could mean when dealing with application protocols negotiated via SIP as well.
Co-Constructing Explanations for AI Systems using ProvenancePaul Groth
Explanation is not a one off - it's a process where people and systems work together to gain understanding. This idea of co-constructing explanations or explanation by exploration is powerful way to frame the problem of explanation. In this talk, I discuss our first experiments with this approach for explaining complex AI systems by using provenance. Importantly, I discuss the difficulty of evaluation and discuss some of our first approaches to evaluating these systems at scale. Finally, I touch on the importance of explanation to the comprehensive evaluation of AI systems.
6th Power Grid Model Meetup
Join the Power Grid Model community for an exciting day of sharing experiences, learning from each other, planning, and collaborating.
This hybrid in-person/online event will include a full day agenda, with the opportunity to socialize afterwards for in-person attendees.
If you have a hackathon proposal, tell us when you register!
About Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
New Ways to Reduce Database Costs with ScyllaDBScyllaDB
How ScyllaDB’s latest capabilities can reduce your infrastructure costs
ScyllaDB has been obsessed with price-performance from day 1. Our core database is architected with low-level engineering optimizations that squeeze every ounce of power from the underlying infrastructure. And we just completed a multi-year effort to introduce a set of new capabilities for additional savings.
Join this webinar to learn about these new capabilities: the underlying challenges we wanted to address, the workloads that will benefit most from each, and how to get started. We’ll cover ways to:
- Avoid overprovisioning with “just-in-time” scaling
- Safely operate at up to ~90% storage utilization
- Cut network costs with new compression strategies and file-based streaming
We’ll also highlight a “hidden gem” capability that lets you safely balance multiple workloads in a single cluster. To conclude, we will share the efficiency-focused capabilities on our short-term and long-term roadmaps.
Offshore IT Support: Balancing In-House and Offshore Help Desk Techniciansjohn823664
In today's always-on digital environment, businesses must deliver seamless IT support across time zones, devices, and departments. This SlideShare explores how companies can strategically combine in-house expertise with offshore talent to build a high-performing, cost-efficient help desk operation.
From the benefits and challenges of offshore support to practical models for integrating global teams, this presentation offers insights, real-world examples, and key metrics for success. Whether you're scaling a startup or optimizing enterprise support, discover how to balance cost, quality, and responsiveness with a hybrid IT support strategy.
Perfect for IT managers, operations leads, and business owners considering global help desk solutions.
Maxx nft market place new generation nft marketing placeusersalmanrazdelhi
PREFACE OF MAXXNFT
MaxxNFT: Powering the Future of Digital Ownership
MaxxNFT is a cutting-edge Web3 platform designed to revolutionize how
digital assets are owned, traded, and valued. Positioned at the forefront of the
NFT movement, MaxxNFT views NFTs not just as collectibles, but as the next
generation of internet equity—unique, verifiable digital assets that unlock new
possibilities for creators, investors, and everyday users alike.
Through strategic integrations with OKT Chain and OKX Web3, MaxxNFT
enables seamless cross-chain NFT trading, improved liquidity, and enhanced
user accessibility. These collaborations make it easier than ever to participate
in the NFT ecosystem while expanding the platform’s global reach.
With a focus on innovation, user rewards, and inclusive financial growth,
MaxxNFT offers multiple income streams—from referral bonuses to liquidity
incentives—creating a vibrant community-driven economy. Whether you
'
re
minting your first NFT or building a digital asset portfolio, MaxxNFT empowers
you to participate in the future of decentralized value exchange.
https://maxxnft.xyz/
Improving Developer Productivity With DORA, SPACE, and DevExJustin Reock
Ready to measure and improve developer productivity in your organization?
Join Justin Reock, Deputy CTO at DX, for an interactive session where you'll learn actionable strategies to measure and increase engineering performance.
Leave this session equipped with a comprehensive understanding of developer productivity and a roadmap to create a high-performing engineering team in your company.
Introduction and Background:
Study Overview and Methodology: The study analyzes the IT market in Israel, covering over 160 markets and 760 companies/products/services. It includes vendor rankings, IT budgets, and trends from 2025-2029. Vendors participate in detailed briefings and surveys.
Vendor Listings: The presentation lists numerous vendors across various pages, detailing their names and services. These vendors are ranked based on their participation and market presence.
Market Insights and Trends: Key insights include IT market forecasts, economic factors affecting IT budgets, and the impact of AI on enterprise IT. The study highlights the importance of AI integration and the concept of creative destruction.
Agentic AI and Future Predictions: Agentic AI is expected to transform human-agent collaboration, with AI systems understanding context and orchestrating complex processes. Future predictions include AI's role in shopping and enterprise IT.
Droidal: AI Agents Revolutionizing HealthcareDroidal LLC
Droidal’s AI Agents are transforming healthcare by bringing intelligence, speed, and efficiency to key areas such as Revenue Cycle Management (RCM), clinical operations, and patient engagement. Built specifically for the needs of U.S. hospitals and clinics, Droidal's solutions are designed to improve outcomes and reduce administrative burden.
Through simple visuals and clear examples, the presentation explains how AI Agents can support medical coding, streamline claims processing, manage denials, ensure compliance, and enhance communication between providers and patients. By integrating seamlessly with existing systems, these agents act as digital coworkers that deliver faster reimbursements, reduce errors, and enable teams to focus more on patient care.
Droidal's AI technology is more than just automation — it's a shift toward intelligent healthcare operations that are scalable, secure, and cost-effective. The presentation also offers insights into future developments in AI-driven healthcare, including how continuous learning and agent autonomy will redefine daily workflows.
Whether you're a healthcare administrator, a tech leader, or a provider looking for smarter solutions, this presentation offers a compelling overview of how Droidal’s AI Agents can help your organization achieve operational excellence and better patient outcomes.
A free demo trial is available for those interested in experiencing Droidal’s AI Agents firsthand. Our team will walk you through a live demo tailored to your specific workflows, helping you understand the immediate value and long-term impact of adopting AI in your healthcare environment.
To request a free trial or learn more:
https://droidal.com/
Contributing to WordPress With & Without Code.pptxPatrick Lumumba
Contributing to WordPress: Making an Impact on the Test Team—With or Without Coding Skills
WordPress survives on collaboration, and the Test Team plays a very important role in ensuring the CMS is stable, user-friendly, and accessible to everyone.
This talk aims to deconstruct the myth that one has to be a developer to contribute to WordPress. In this session, I will share with the audience how to get involved with the WordPress Team, whether a coder or not.
We’ll explore practical ways to contribute, from testing new features, and patches, to reporting bugs. By the end of this talk, the audience will have the tools and confidence to make a meaningful impact on WordPress—no matter the skill set.
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...Aaryan Kansari
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generative AI
Discover Agentic AI, the revolutionary step beyond reactive generative AI. Learn how these autonomous systems can reason, plan, execute, and adapt to achieve human-defined goals, acting as digital co-workers. Explore its promise, key frameworks like LangChain and AutoGen, and the challenges in designing reliable and safe AI agents for future workflows.
Sticky Note Bullets:
Definition: Next stage beyond ChatGPT-like systems, offering true autonomy.
Core Function: Can "reason, plan, execute and adapt" independently.
Distinction: Proactive (sets own actions for goals) vs. Reactive (responds to prompts).
Promise: Acts as "digital co-workers," handling grunt work like research, drafting, bug fixing.
Industry Outlook: Seen as a game-changer; Deloitte predicts 50% of companies using GenAI will have agentic AI pilots by 2027.
Key Frameworks: LangChain, Microsoft's AutoGen, LangGraph, CrewAI.
Development Focus: Learning to think in workflows and goals, not just model outputs.
Challenges: Ensuring reliability, safety; agents can still hallucinate or go astray.
Best Practices: Start small, iterate, add memory, keep humans in the loop for final decisions.
Use Cases: Limited only by imagination (e.g., drafting business plans, complex simulations).
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...Aaryan Kansari
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
1. Step On In,
The Water’s Fine!
An Introduction To
Security Testing Within A
Virtualized Environment
3. Thank You!
…to all of the crew that has a
part in this amazing
conference!
4. About Me:
• Tom Moore – Twitter: @c0ncealed
• Christian, Husband, & Father
• Red Team / Penetration Tester
• High Hack Society / Proverbs Hackers
/ 304Geek
• Unrelenting G33K
• 2nd Amendment Supporter
• Should in NO WAY be considered an
expert in anything that I may say. =)
• SUPPORT HACKERS FOR CHARITY!
5. Agenda:
My goal is to provide
meaningful information in
the area of virtualized testing
environment options. I also wish
to convey why an understanding
of this subject is vastly needed
and for the most part easily
attainable, even though the
subject is often avoided
or overlooked.
10. Role Playing:
You are applying for a role within an
organization’s Information Security
Group...
One of the questions that a reputable
organization ‘should’ ask you would be:
“What you are doing to either maintain,
or increase your relevant skill-set?”
What is your response?
11. What Is Needed:
Candidates for employment that not only
have a degree or relevant certifications,
but also possess a true working
knowledge of how to leverage their
toolsets to achieve the expected goal.
12. What Can Be Done:
Security Professionals in training need to
take a more direct approach towards
ensuring that they understand not only
the tools introduced to them, but also
the underlying architectures that they
operate on.
A more informed candidate is what is
being sought after in today’s Information
Security job market.
14. What Is Needed:
Candidates for employment that not only
have a degree or relevant certifications,
but also possess a true working
knowledge of how to leverage their
toolsets to achieve the expected goal.
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
15. What Is Needed:
Candidates for employment that not only
have a degree or relevant certifications,
but also possess a true working
knowledge of how to leverage their
toolsets to achieve the expected goal.
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
16. What Is Needed:
Candidates for employment that not only
have a degree or relevant certifications,
but also possess a true working
knowledge of how to leverage their
toolsets to achieve the expected goal.
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
17. How You Can Get There:
Practice… Practice… Practice…
Where You Can Practice:
18. How You Can Get There:
Practice… Practice… Practice…
Where You Can Practice:
19. How You Can Get There:
Practice… Practice… Practice…
Where You Can Practice:
Set up your own virtual lab!
• The cost is well worth the gain
• There are many open-source solutions
• Many toolset distributions now use
virtual machines as primary medium
• A wide variety of vulnerable
environments are also available for
your learning pleasure
21. Definition of Terms:
Hypervisor:
A hypervisor is a virtual machine
monitor (VMM).
It is generally a piece of computer
software, firmware, or hardware that
creates and runs virtual machines.
A computer on which a hypervisor is
running is defined as a host machine.
The virtual machines that run on this
host are referred to as guest machines.
22. Definition of Terms:
Virtual Machine:
A virtual machine (VM) is a software
based emulation of a computer.
Virtual machines generally operate
based on the architecture and functions
of a real computer.
23. Definition of Terms:
Snapshot:
A snapshot preserves the state and data
of a virtual machine at a specific point in
time.
The state includes the VM’s power state.
(ex: powered-on, powered-off, or
suspended)
The data includes all of the files that
make up the VM. This includes disks,
memory, and other devices, such as
virtual network interface cards.
24. Definition of Terms:
Snapshot:
A snapshot preserves the state and data
of a virtual machine at a specific point in
time.
The state includes the VM’s power state.
(ex: powered-on, powered-off, or
suspended)
The data includes all of the files that
make up the VM. This includes disks,
memory, and other devices, such as
virtual network interface cards.
25. Definition of Terms:
Snapshot:
A snapshot preserves the state and data
of a virtual machine at a specific point in
time.
The state includes the VM’s power state.
(ex: powered-on, powered-off, or
suspended)
The data includes all of the files that
make up the VM. This includes disks,
memory, and other devices, such as
virtual network interface cards.
26. Definition of Terms:
Bridged / NAT / Host Only :
The options available to configure virtual
network adapters within VM’s.
Bridged: Binds the virtual network adapter directly
to your physical ethernet adapter. The VM will obtain
DHCP lease from the physical network.
NAT: Binds the virtual network adapter behind a NAT
environment. Obtains internal DHCP address and
shares the physical ethernet adapter’s public IP
address for external communication.
Host Only: Allows internal network communication
only. DHCP lease obtained behind internal NAT.
27. Let’s Get Technical:
Enough with the hypothetical, let’s get
into the bits… cause this bytes… =P
Structure for the approach:
• Hardware considerations
• Virtualization platform options
• Example set-up of Vmware ESXi
• Offensive or Forensic Distributions
• Ex: Kali, SamuraiWTF, SIFT, etc.
• Virtual Appliances
• Vulnerable Distributions
• Ex: Metasploitable 2 or NOWASP
28. Hardware Considerations:
• While the CPU speeds do matter, they
will not be your primary concern.
• A quad-core CPU is recommended.
• What you will need plenty of are:
• Memory (RAM)
• Hypervisors are memory hogs.
• Hard Drive Capacity (HDD)
• VM’s range drastically in size,
especially when Snapshotted.
• A sufficient Power Supply will need to
be accounted for based on the above
specifications.
29. Virtualization Platforms:
• VMware Fusion (Mac)
• VMware Player/Workstation (Win/Linux)
• VMware ESXi/ESX (Server)
• Parallels (Mac)
• Oracle VirtualBox (Mac/Win/Linux)
• ProxMox (Server, running OpenVZ as guest)
• XenServer (Server, running OpenVZ as guest)
This list should not be considered all-inclusive.
These are simply platforms that I have tested and
that are for the most part easily attainable.
30. VMware ESXi Setup:
• For our example, I have set up a
VMware ESXi Hypervisor on this
MacBook Pro system.
• System Specs:
• CPU: Quad-core Intel i7 2GHz
• RAM: 16GB 1333MHz DDR3
• HDD: WD Black 500GB 7200 RPM
• VMware ESXi is free for educational
purposes. Register on vmware.com for
a license key.
31. VMware ESXi Setup:
• Further Information…
• This installation is performed by
using the following configuration:
•VMware ESXi .iso image is on host
MacBook Pro.
•Created a New virtual machine
within VMware Fusion.
•Set the ESXi .iso as the boot media
for the VM.
• (This is being done this way for
demonstration purposes. If you have
physical hardware for ESXi, use that)
53. VMware ESXi Management:
• The one disadvantage to using
VMware ESXi, in my opinion, is that
the most effective management
interface is in the form of a Windows
fat client.
• Due to this, we will also go through
the process of setting up a Windows 8
VM with the VMware vSphere Client as
well as the VMware vCenter Converter
Standalone application.
• This will be our ESXi management VM.
54. VMware ESXi Management:
• Further Information…
• This installation is performed by
using the following configuration:
•Windows 8.1 .iso image is on host
MacBook Pro.
•Created a New virtual machine
within VMware Fusion.
•Set the Windows 8.1 .iso as the
boot media for the VM.
• (This is done so that we don’t have to
have a physical Windows box for ESXi
Management.)
90. VMware ESXi Management:
• Now we will register VMware ESXi
Server through the vSphere Client.
• The key should have been obtained
when you registered for your
vmware.com account and downloaded
your ESXi iso files and binaries.
• When its registered, you will see the
status message in the bottom right-hand
corner of the client disappear.
98. VMware ESXi Management:
• Now we will setup VMware vCenter
Converter Standalone.
• This will be used to convert VMware
images into an ESXi format.
• It will also transfer VM’s over to our
ESXi Server after conversion.
123. Vulnerable Distributions:
• Leveraging VulnHub.com, we will pull
down a copy of Metasploitable2 as our
vulnerable guest distribution.
• Now we will use VMware vCenter
Converter Standalone to convert our
new vulnerable image and then push
it to our ESXi server.
145. Vulnerable Distributions:
• Now let’s spin it up!
• Once we have the Metasploitable 2 VM
powered on, we will go back to our
Kali VM within VMware Fusion.
• From the Kali offensive VM, let’s scan
the virtual DHCP range looking for our
new vulnerable guest machine!
150. Congratulations!:
• You have just gone through the
process of setting up a virtual testing
lab with a VMware ESXi hypervisor!
• You have a Windows VM set up to
manage your hypervisor.
• You know where to obtain your
Offensive, Appliance, and Vulnerable
distributions and VMs.
• You also know how to convert and
transfer them to your ESXi server!
• You then saw how easy it was to
enumerate guests from your Kali VM!
151. Summary:
• InfoSec Recruiters for organizations
are looking for candidates that KNOW
how to leverage the needed tools to
perform an assessment.
• You can teach yourself skills that may
not be covered in most curriculums
through the use of Virtual
Environments.
• It takes time, it’s not easy, but it will
pay off.
• YOU CAN DO IT!
152. Summary:
• InfoSec Recruiters for organizations
are looking for candidates that KNOW
how to leverage the needed tools to
perform an assessment.
• You can teach yourself skills that may
not be covered in most curriculums
through the use of Virtual
Environments.
• It takes time, it’s not easy, but it will
pay off.
• YOU CAN DO IT!
156. Resources:
• Vulnerable Distributions
• VulnHub- http://www.vulnhub.com
(Many worth mentioning, but this site will get you there)
157. One More Thing:
• If you want to experience another
amazing conference with the same feel
as DerbyCon, go to Hack3rCon!
• When: November 14-16, 2014
• Where: Charleston, WV
• Web: www.hack3rcon.org
• Twitter: @hack3rcon
#14: In addition to book learning, hands-on experience with these toolsets should be the recipient of your invested time.
#18: Another reason why training yourself to test in virtual environments is so valuable, is that most companies are now
#19: Another reason why training yourself to test in virtual environments is so valuable, is that most companies are now
#20: Another reason why training yourself to test in virtual environments is so valuable, is that most companies are now
#21: Some might argue that familiarizing yourself within a virtual environment will be a more relevant method of training and will give you experience that employers are already looking for in their next-generation of security professionals.
#29: All of this is relative.
I’ll be setting up an ESXi VM on my MBP
It is running a Quad-core i7 2GHz CPU
and has 16GB 1333 MHz DDR3 Ram
Western Digital Black 500gb 7200 RPM HDD
#30: All of this is relative.
I’ll be setting up an ESXi VM on my MBP
It is running a Quad-core i7 2GHz CPU
and has 16GB 1333 MHz DDR3 Ram
Western Digital Black 500gb 7200 RPM HDD
#31: All of this is relative.
I’ll be setting up an ESXi VM on my MBP
It is running a Quad-core i7 2GHz CPU
and has 16GB 1333 MHz DDR3 Ram
Western Digital Black 500gb 7200 RPM HDD