Questions
Lets try to answer some questions based on the knowledge you grabbed from the chapter:
- What are two virtualization platforms that can be used to create and host virtual machines?
- What does .vmdk stand for?
- What are the default login credentials for Metasploitable 2?
- If building the Metasploitable 3 server from scratch, what other additional pieces of software are required?
- What is the command used to install a new package or to update an existing package in Kali Linux?
- What command is used to start the MySQL service?
- What command is used to start the SSH service?
推薦閱讀
- 電子支付的規制結構配置研究
- 計算機使用安全與防護
- 網絡運維親歷記 (網絡運維紀實文學)
- 硬黑客:智能硬件生死之戰
- 局域網交換機安全
- API安全技術與實戰
- 數據保護:工作負載的可恢復性
- End to End GUI Development with Qt5
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Learn Azure Sentinel
- 網絡攻防實戰研究:MySQL數據庫安全
- 云計算安全技術與應用
- Securing Network Infrastructure
- 計算機網絡安全與應用技術(第2版)
- 防火墻和VPN技術與實踐