I want to create a Virtual Machine that has vulnerabilities. I already have a Kali Linux Virtual Machine to attack with. How can I create a Virtual Machine that is unsecure