官术网_书友最值得收藏!

Summary

In this chapter, we learned how to use VirtualBox, which allows us to install machines such as Kali Linux, and Windows, inside our own machine. We also learned how to install Kali Linux, which is going to be our attacking machine throughout the book, and how to install our victim machines, Windows and Metasploitable. Lastly, we studied what snapshots are, and how they can help us to retain our past setups in the virtual environment.

In upcoming chapters, we will see how to use the Kali Linux machine to attack both the Windows machine and the Metasploitable machine.

主站蜘蛛池模板: 大埔区| 巴林左旗| 盐山县| 随州市| 襄城县| 扎兰屯市| 武定县| 武汉市| 含山县| 精河县| 凌海市| 澎湖县| 大方县| 衡东县| 厦门市| 合水县| 金华市| 巩留县| 庄河市| 濉溪县| 大邑县| 平遥县| 调兵山市| 阿克苏市| 巢湖市| 西乡县| 南和县| 海林市| 遂宁市| 山丹县| 博湖县| 沙湾县| 曲水县| 沅江市| 洛宁县| 乐平市| 根河市| 芜湖县| 四平市| 怀安县| 闽清县|