Environment and Virtual Machine setup instructions
Initial Setup & Installation
Prerequisites on the EPITA laptop
VM Installation & Verification
Quickly set up the attacker and victim VM disks
Attacking VM Setup
Configure and use the attacking VM
Victim VM Setup
Configure and use the victim VM to load EpiRootkit