官术网_书友最值得收藏!

Summary

In this chapter, we began to build a solid foundation as you learned about penetration testing and how it differs from vulnerability and red team assessments. We defined the importance of leveraging a methodology or standard for penetration testing, such as the PTES standard and the various phases within it. Within each phase, we discussed what is involved and highlighted some important facets that should not be overlooked, such as the "get out of jail free card". Lastly, we looked at a lab environment, the various hypervisors that currently exist, and how to build a Metasploitable lab environment for future use.

In the next chapter (Chapter 2, Getting Started with Kali Linux), we will dive into Kali Linux to explore the different install options for Kali Linux and some initial configuration that is required. We will explore some of the essential tools within Kali Linux and what their main uses are.

主站蜘蛛池模板: 瓦房店市| 庆阳市| 布尔津县| 襄汾县| 宜兰市| 若尔盖县| 沙洋县| 渭源县| 池州市| 甘肃省| 崇仁县| 临漳县| 马尔康县| 绥中县| 新乡市| 凯里市| 呼和浩特市| 延安市| 绍兴县| 浏阳市| 广东省| 宁明县| 龙岩市| 信宜市| 天全县| 阳西县| 紫金县| 襄城县| 英山县| 盐边县| 昆明市| 哈密市| 东乡族自治县| 闻喜县| 广河县| 营山县| 舞阳县| 曲水县| 蓝田县| 郧西县| 黎川县|