官术网_书友最值得收藏!

Summary

In this chapter, we had a journey into different goal-based penetration testing methodologies that help organizations to test themselves against real-time attacks. We saw how penetration testers can use Kali in multiple different platforms to assess the security of data systems and networks. We have taken a dive into installing Kali on different virtualized platforms and have looked at how quickly we can run a Linux operating system on the Windows platform using Docker.

We built our own verification lab, set up Active Directory Domain Services, and also set up two different virtual machines on the same network. Most importantly, you learned how to customize Kali to increase the security of our tools and the data that they collect. We are working to achieve the goal of making tools support our process, instead of the other way around!

In the next chapter, you will learn how to effectively master Open Source Intelligence (OSINT) to identify the vulnerable attack surfaces of our target and create customized username-password lists to facilitate more focused attacks and other exploits.

主站蜘蛛池模板: 兴义市| 鹤山市| 凤冈县| 且末县| 左权县| 洛隆县| 中阳县| 武汉市| 江门市| 黔西县| 广饶县| 张家界市| 石河子市| 宕昌县| 丹凤县| 冕宁县| 县级市| 镇宁| 青州市| 萝北县| 广昌县| 玉林市| 平原县| 鱼台县| 锡林郭勒盟| 莱芜市| 深泽县| 尼木县| 潮安县| 永春县| 讷河市| 工布江达县| 禹城市| 汾西县| 康平县| 泸西县| 通山县| 全南县| 左云县| 双峰县| 尚义县|