官术网_书友最值得收藏!

Summary

When looking at the vast array of tools in the latest version of Kali Linux, we can see that there is functionality for a wide variety of security tasks. These include digital forensics, wireless security assessments, reverse engineering software, hacking hardware, and penetration testing.

There was also a discussion on the variety of ways that Kali Linux can be deployed. There is the ability to deploy Kali Linux using a live DVD or USB or SD card, installing it as a virtual machine, and also using it as the primary operating system on a standalone system or even in the cloud.

As with any other software, Kali Linux also needs to be updated, whether we only update the software applications or the Linux kernel included in the distribution.

In the next chapter, we will look at setting up our pentesting lab.

主站蜘蛛池模板: 讷河市| 卢氏县| 金溪县| 柳林县| 长垣县| 云和县| 潍坊市| 望江县| 进贤县| 镇宁| 镇雄县| 辉县市| 侯马市| 新平| 常熟市| 教育| 文昌市| 昔阳县| 电白县| 镇宁| 石城县| 云南省| 静安区| 汉源县| 宜川县| 普洱| 镶黄旗| 大石桥市| 十堰市| 武义县| 祁门县| 丰城市| 陆良县| 安乡县| 昌都县| 收藏| 馆陶县| 怀安县| 高雄县| 历史| 合阳县|