1 00:00:00,140 --> 00:00:03,740 This is the virtual machines architecture diagram. 2 00:00:04,500 --> 00:00:09,810 It'll help you understand the network structure of the virtual machines that are installed in the laboratory 3 00:00:09,810 --> 00:00:11,550 environment of this course. 4 00:00:12,440 --> 00:00:14,450 So let's have a look at the whole picture. 5 00:00:15,170 --> 00:00:21,860 Host Is your computer on the network that you access the Internet via Wi-Fi access point or a wired 6 00:00:21,860 --> 00:00:22,610 connection? 7 00:00:23,490 --> 00:00:30,030 You will install one of the virtualization platforms such as VMware or Oracle VirtualBox on your host 8 00:00:30,030 --> 00:00:30,690 machine. 9 00:00:32,380 --> 00:00:38,080 So there are five vulnerable machines that will be used as victims throughout this course. 10 00:00:38,800 --> 00:00:42,760 Kali, Linux, Windows XP, Windows 8 and Owasp. 11 00:00:42,760 --> 00:00:44,590 Broken Web applications. 12 00:00:46,190 --> 00:00:52,940 Then here we set the network mode to Nat Network and that connects all the vulnerable machines in the 13 00:00:52,940 --> 00:00:53,990 same network. 14 00:00:55,460 --> 00:01:00,710 Now, you may notice here there are similar Nat modes in VirtualBox network settings. 15 00:01:00,740 --> 00:01:03,680 Nat mode and Nat network mode. 16 00:01:04,440 --> 00:01:11,940 So if you're going to use Oracle VirtualBox, be sure to select Nat network mode and then set the same 17 00:01:11,940 --> 00:01:13,830 network for each machine. 18 00:01:14,650 --> 00:01:21,010 That way the virtual machines will be on the same network and they can be accessed from one to the other. 19 00:01:22,620 --> 00:01:26,970 Now, if you're going to use VMware, simply select nat mode.