Preparing the Guest (Android on Linux Machine)¶
At this point, you should have configured the Cuckoo host component, as well as designed and defined the number and the names of the virtual machines you will use for malware execution.
Now it’s time to create Linux machines and to configure them properly.
- Guest Machine Architecture
- Host Configuration
- Creation of the Linux Virtual Machine
- Network Configuration
- Installing the Agent
- Saving the Virtual Machine
- Cloning the Virtual Machine