Setting up exploitable targets in a virtual environment