Preparing the Guest (Android Device Cross-platform)¶
At this point, you should have configured the Cuckoo host component, as well as designed and defined the number and the names of the virtual machines you will use for malware execution.
Now it’s time to create Android machines and to configure them properly.
- Guest Machine Architecture
- Host Configuration
- Creation of the Linux Virtual Machine
- Network Configuration
- Saving the Virtual Machine
- Cloning the Virtual Machine