官术网_书友最值得收藏!

Section 2: Exploitation

In this section, you will start actively working with the various tools within Kali Linux. You will learn how to perform a multitude of tasks spanning across the various stages of a penetration test. The aim here is to exploit the target, so we will be working with attacks focused on social engineering, Metasploit, and more. We will cover multiple technologies here, such as wireless networks and web applications.

The following chapters will be covered in this section:

主站蜘蛛池模板: 千阳县| 肥西县| 荣昌县| 咸丰县| 芮城县| 耿马| 辉县市| 营山县| 博罗县| 吕梁市| 福海县| 江孜县| 凤凰县| 巧家县| 合江县| 永新县| 云南省| 静安区| 麻江县| 红桥区| 大兴区| 宁国市| 张家界市| 德阳市| 竹溪县| 沁水县| 滕州市| 溆浦县| 湛江市| 青浦区| 通道| 额尔古纳市| 乌拉特中旗| 山东省| 秭归县| 孟州市| 肇庆市| 海南省| 衡阳县| 容城县| 横峰县|