官术网_书友最值得收藏!

Summary

In this chapter, we looked at some brief descriptions of the topics that will be thoroughly covered in this book. We discussed using a Linux machine to hack a computer with the Windows operating system. Then, we learned about the concept of hacking through the use of real-time examples. The different types of hackers were discussed. Finally, we saw various applications involved in hacking.

In the following chapter, we will set up a virtual environment to perform various penetration tests. We will also install Kali Linux, Windows, and Metaspoitable machines.

主站蜘蛛池模板: 铜鼓县| 乌鲁木齐市| 淳安县| 天津市| 阳春市| 牟定县| 措勤县| 青海省| 阜平县| 怀安县| 佳木斯市| 五指山市| 罗平县| 昌都县| 大理市| 江安县| 潞西市| 新津县| 安康市| 班玛县| 黄梅县| 安新县| 临潭县| 喀喇沁旗| 贵南县| 宁都县| 岐山县| 辽宁省| 宜宾县| 日土县| 平乐县| 综艺| 广州市| 长阳| 东台市| 惠州市| 英吉沙县| 北安市| 思茅市| 报价| 辽宁省|