We must thank IT virtualization as it led us to cloud technology. Today's IT infrastructures are already running their mission critical business applications on virtual machines. Like the physical infrastructure, virtualization is also cursed with cyber security challenges. This article talks about a typical open source virtualization solution and depicts the steps to secure its.

INFORMATION GATHERING ( REDHAWK ) USING KALI

Basic Reconnaisance:

cybersecurity Framework


GEO-IP LOOKING

cybersecurity Framework


GRAB BANNERS:

cybersecurity Framework


DNS LOOKUP:

cybersecurity Framework


SUBNET CALCULATOR:

cybersecurity Framework


NMAP PORT SCANNING:

cybersecurity Framework


SUBDOMAIN:

cybersecurity Framework