官术网_书友最值得收藏!

Summary

In this chapter, we looked at some brief descriptions of the topics that will be thoroughly covered in this book. We discussed using a Linux machine to hack a computer with the Windows operating system. Then, we learned about the concept of hacking through the use of real-time examples. The different types of hackers were discussed. Finally, we saw various applications involved in hacking.

In the following chapter, we will set up a virtual environment to perform various penetration tests. We will also install Kali Linux, Windows, and Metaspoitable machines.

主站蜘蛛池模板: 庆城县| 肥乡县| 尚义县| 义马市| 蓬安县| 军事| 齐齐哈尔市| 林甸县| 浏阳市| 茌平县| 江津市| 隆昌县| 连州市| 华蓥市| 遵义县| 博乐市| 和顺县| 波密县| 福海县| 泾川县| 汝阳县| 江阴市| 滦平县| 老河口市| 盐源县| 淅川县| 宝应县| 涿鹿县| 衡阳市| 林甸县| 淮阳县| 青龙| 黄梅县| 曲松县| 建阳市| 肇庆市| 靖远县| 阜南县| 会昌县| 怀仁县| 西青区|