Preparing the Guest¶
At this point you should have configured the CAPE host component and you should have designed and defined the number and the names of the virtual machines you are going to use for malware execution.
Now it’s time to create such machines and to configure them properly.
- Creation of the Virtual Machine
- Network Configuration
- Installing the Agent
- Saving the Virtual Machine
- Cloning the Virtual Machine
- Installing the Linux host