当前位置:网站首页>The detailed installation process of Ninja security penetration system (Ninjitsu OS V3). Both old and new VM versions can be installed through personal testing, with download sources
The detailed installation process of Ninja security penetration system (Ninjitsu OS V3). Both old and new VM versions can be installed through personal testing, with download sources
2022-07-04 12:09:00 【Black zone (rise)】
I thought there was only a new version vm15 To install and successfully start the Ninja system ,
But my vm12 It can also be installed and successfully started
Mirror download link :( Image source :https://blog.csdn.net/qq_35258210/article/details/115457883)
https://pan.baidu.com/s/1CAw9ztIUhCZgydNWHHWINg
password : a33b
This article is more detailed and suitable for novices , about vm Less frequently used .
First step :
vm Create a new virtual machine in
Name yourself , Then choose the location you want to install , It is best to unify the location of virtual machines , Convenient for future sorting
The second step :
System installation
Wait for the installation to complete
After installation , Unlock code toor
The third step :
Install the Chinese language pack
win+R Input services.msc Enter key
find windows update, double-click , Select the second one and click apply, Click again start, Point again ok
Find the language setting page in the setting interface
If you do not choose Chinese when installing the system
Just add a language ( Skip this step if you have chosen )
options Options
Click to download
Close the system update after downloading , Select the last click apple, Click again OK, Again stop
Enter the language setting interface , Choose Chinese
After selection , Just re-enter ok 了
边栏推荐
- Customized version of cacti host template
- How to create a new virtual machine
- Climb Phoenix Mountain on December 19, 2021
- SAP ui5 date type sap ui. model. type. Analysis of the display format of date
- Usage of case when then else end statement
- Summary of Shanghai Jiaotong University postgraduate entrance examination module firewall technology
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 14
- LxC shared directory addition and deletion
- [Android reverse] function interception instance (③ refresh CPU cache | ④ process interception function | ⑤ return specific results)
- DVC use case (VI): Data Registry
猜你喜欢
QQ group administrators
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 13
Using terminal connection in different modes of virtual machine
os. Path built-in module
TCP slicing and PSH understanding
Method of setting default items in C # ComboBox control code
Post man JSON script version conversion
(August 9, 2021) example exercise of air quality index calculation (I)
TCP fast retransmission sack mechanism
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 6
随机推荐
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 12
Function parameters (positional parameters, default value parameters, variable parameters, named keyword parameters, keyword parameters)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 10
Snowflake won the 2021 annual database
Introduction of network security research direction of Shanghai Jiaotong University
Xshell's ssh server rejected the password, failed to skip publickey authentication, and did not register with the server
Post man JSON script version conversion
SSH principle and public key authentication
Awk getting started to proficient series - awk quick start
Decrypt the advantages of low code and unlock efficient application development
Using terminal connection in different modes of virtual machine
2020 Summary - Magic year, magic me
Ternsort model integration summary
Local MySQL forget password modification method (Windows) [easy to understand]
Polymorphic system summary
Customized version of cacti host template
Process communication and thread explanation
2021-11-02
Alibaba cloud server connection intranet operation
Single spa, Qiankun, Friday access practice