Configuring virtual machines for correct communication
Getting to know web applications on a vulnerable VM
Introduction
In the first chapter, we will cover how to prepare our Kali Linux installation to be able to follow all the recipes in the book and set up a laboratory with vulnerable web applications using virtual machines.