///

home
menu

My malware analysis lab project

Introduction - why isolation is needed?

Malware Analysis Lab Network Topology Diagram
Fig 1. Isolated network architecture using /30 subnetting.

Configuration of FlareVM machine