1 00:00:00,330 --> 00:00:03,600 This is the virtual machines architecture diagram. 2 00:00:04,650 --> 00:00:09,290 They'll help you understand the network structure of the virtual machines that are installed in the 3 00:00:09,290 --> 00:00:11,390 laboratory environment of this court's. 4 00:00:12,770 --> 00:00:14,280 Let's have a look at the whole picture. 5 00:00:15,370 --> 00:00:21,940 Host, is your computer on the network that you access the Internet via Wi-Fi access point or a wired 6 00:00:21,940 --> 00:00:22,420 connection? 7 00:00:23,750 --> 00:00:30,140 You install one of the virtualization platforms such as VM Where or Oracle Virtual Box on your host 8 00:00:30,140 --> 00:00:30,530 machine. 9 00:00:32,640 --> 00:00:37,890 So there are five vulnerable machines that will be used as victims throughout this course. 10 00:00:38,910 --> 00:00:45,530 Kelly, Linux, Windows XP, Windows eight, a spoiler bill and a WASP broken Web application. 11 00:00:47,560 --> 00:00:54,520 And here we said the network mode to net network that connects all the vulnerable machines in the same 12 00:00:54,520 --> 00:00:55,100 network. 13 00:00:56,840 --> 00:01:03,650 Now, you may notice here there are similar net modes in virtual box network settings, not mode and 14 00:01:03,770 --> 00:01:04,750 not network mode. 15 00:01:05,990 --> 00:01:08,480 So if you're going to use Oracle virtual buys. 16 00:01:08,960 --> 00:01:14,930 Be sure to select NAT network mode and then set the same network for each machine. 17 00:01:15,960 --> 00:01:21,900 That way, the virtual machines will be on the same network and they can be accessed from one to the 18 00:01:21,900 --> 00:01:22,110 other. 19 00:01:24,090 --> 00:01:28,080 Now, if you're going to use VM, where simply select NAT mode.