官术网_书友最值得收藏!

To get the most out of this book

In order to gain the most benefit from the practical aspects of this book, you will need to have a virtualization environment set up. This can be set up using VMware or VirtualBox. Hyper-V will work, but there is a restriction that does not allow you to link a wireless card directly to the virtual machine. This prevents you from performing wireless attacks if you have a compatible wireless card.

The penetration testing operating system of choice is Kali Linux. Having some basic Linux knowledge is not mandatory, but would be beneficial. Kali Linux contains hundreds of tools. We do not focus on all of them, but only on the tools that would get the job done. Occasionally, we will look at tools that are available on the internet, but the installation and setup steps are clearly defined within the book.

The target systems used in this book are predominantly freely available, such as Metasploitable and OWASP BWA. We will work with Windows Server and Windows 10 as a target operating system in some chapters; the evaluation editions of these operating systems will suffice. Having knowledge of how to set up Active Directory would be beneficial.

Finally, this book does not focus on a specific target operating system, instead focusing on teaching you how to use various techniques, methodologies, and tools to obtain the results you need. Your knowledge will increase over time as you continue to apply what you have learned and gain experience by practicing your skills with various other vulnerable machines found on the internet.

主站蜘蛛池模板: 墨江| 金乡县| 南华县| 巴彦淖尔市| 元朗区| 三原县| 西林县| 关岭| 雷山县| 潞西市| 藁城市| 宜兰市| 伊吾县| 山西省| 文成县| 姚安县| 衢州市| 聂拉木县| 屯留县| 黑河市| 郑州市| 九龙县| 东台市| 江西省| 莫力| 天等县| 吉木萨尔县| 垫江县| 南岸区| 南丰县| 连江县| 巴楚县| 乌拉特后旗| 当雄县| 车险| 南澳县| 邵东县| 平顶山市| 南乐县| 扬中市| 东阳市|