官术网_书友最值得收藏!

Summary

In this chapter, we began to build a solid foundation as you learned about penetration testing and how it differs from vulnerability and red team assessments. We defined the importance of leveraging a methodology or standard for penetration testing, such as the PTES standard and the various phases within it. Within each phase, we discussed what is involved and highlighted some important facets that should not be overlooked, such as the "get out of jail free card". Lastly, we looked at a lab environment, the various hypervisors that currently exist, and how to build a Metasploitable lab environment for future use.

In the next chapter (Chapter 2, Getting Started with Kali Linux), we will dive into Kali Linux to explore the different install options for Kali Linux and some initial configuration that is required. We will explore some of the essential tools within Kali Linux and what their main uses are.

主站蜘蛛池模板: 新和县| 武乡县| 分宜县| 饶河县| 和龙市| 灯塔市| 简阳市| 营口市| 河源市| 裕民县| 天长市| 尉氏县| 珠海市| 从江县| 武山县| 浠水县| 鹤壁市| 铜鼓县| 邵阳市| 永川市| 秭归县| 安顺市| 江油市| 威海市| 承德市| 永平县| 高要市| 甘南县| 泾源县| 尉氏县| 获嘉县| 辽宁省| 淳化县| 文登市| 云南省| 勃利县| 万盛区| 二手房| 永城市| 晴隆县| 平阳县|