- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 79字
- 2021-06-24 15:59:14
Getting ready
Here is a list of some tools that we will need before we dive deeper into penetration testing. Don't worry, we will learn about their usage with some real-life examples in the next few chapters. But those of us who are excited about them right now can run the following simple commands to view the -help section where toolname is the name of the tool we would like to view the help of:
toolname -help
toolname -h
推薦閱讀
- Mastering vRealize Operations Manager(Second Edition)
- Windows Server 2012 Hyper-V:Deploying the Hyper-V Enterprise Server Virtualization Platform
- Social Media Mining with R
- SOA實踐者說
- Extending Puppet
- 嵌入式Linux系統開發:基于Yocto Project
- 新手易學:系統安裝與重裝
- SharePoint 2013 應用開發實戰
- Learning Magento 2 Administration
- Kali Linux 2018:Windows Penetration Testing
- Linux內核設計的藝術:圖解Linux操作系統架構設計與實現原理
- Social Data Visualization with HTML5 and JavaScript
- VMware vSphere 5.1 Cookbook
- BuddyPress Theme Development
- 電腦辦公(Windows 7 + Office 2013)入門與提高