Experiment 1 Construction and testing of network attack and defense environment
1. Configuration of each virtual machine
1. Target Windows:
2. Target Linux:
3. Attacker Windows:
4. Attacker Linux:
1. Target Windows:
2. Target Linux:
3. Attacker Windows:
4. Attacker Linux: