官术网_书友最值得收藏!

To get the most out of this book

To follow and recreate the examples in this book, you will need six to seven systems or virtual machines. One system can be your penetration testing system, whereas the others can act as your test bed.

Apart from systems or virtualization, you will need the latest VMware image of Kali Linux, which already packs Metasploit by default and contains all the other tools that are required for recreating the examples of this book. However, for some cases, you can use the latest Ubuntu desktop OS with Metasploit installed.

You will also need to install Ubuntu, Windows 7, Windows 10, Windows Server 2008, and Windows Server 2012 either on virtual machines or live systems as all these operating systems will serve as the test bed for Metasploit.

Additionally, links to all other required tools and vulnerable software are provided in the relevant chapters.

If you are using the digital version of this book, we advise you to type the code yourself or access the code via the GitHub repository (link available in the next section). Doing so will help you avoid any potential errors related to copy/pasting of code. 

主站蜘蛛池模板: 武宣县| 黎平县| 桐梓县| 锡林郭勒盟| 白水县| 定远县| 漾濞| 淮安市| 石首市| 长岭县| 旬邑县| 合川市| 贞丰县| 柞水县| 瑞丽市| 黄骅市| 库车县| 宽城| 庄浪县| 和静县| 炉霍县| 琼结县| 保康县| 广宗县| 陇川县| 黄山市| 图木舒克市| 无锡市| 商洛市| 灵璧县| 若尔盖县| 凤台县| 靖西县| 宁河县| 炎陵县| 安岳县| 高尔夫| 襄樊市| 澄迈县| 堆龙德庆县| 汝阳县|