November 2019
Intermediate to advanced
346 pages
9h 36m
English
We began this recipe by creating a VM from an image (step 1). The creation of a VM depends on the format in which the image is given. For the referenced virtual images, double-clicking the .ovf file of the virtual image will allow you to set up a VM. Other times, you may need to create a brand new installation of an operating system and then mount the virtual image. Next, in step 2, we configured our VM for malware analysis. There are several configuration changes you are likely to want to make. These include setting base memory, the number of processors, video memory, and a virtual optical drive; selecting an appropriate network setting; and creating a shared folder.
Having done so, in step 3, we saved a snapshot, which ...