Preparing the Guest (Android on Linux Machine)ΒΆ

At this point, you should have configured the Cuckoo host component, as well as designed and defined the number and the names of the virtual machines you will use for malware execution.

Now it’s time to create Linux machines and to configure them properly.