官术网_书友最值得收藏!

Summary

In this chapter, we had a journey into different goal-based penetration testing methodologies that help organizations to test themselves against real-time attacks. We saw how penetration testers can use Kali in multiple different platforms to assess the security of data systems and networks. We have taken a dive into installing Kali on different virtualized platforms and have looked at how quickly we can run a Linux operating system on the Windows platform using Docker.

We built our own verification lab, set up Active Directory Domain Services, and also set up two different virtual machines on the same network. Most importantly, you learned how to customize Kali to increase the security of our tools and the data that they collect. We are working to achieve the goal of making tools support our process, instead of the other way around!

In the next chapter, you will learn how to effectively master Open Source Intelligence (OSINT) to identify the vulnerable attack surfaces of our target and create customized username-password lists to facilitate more focused attacks and other exploits.

主站蜘蛛池模板: 闽清县| 贡嘎县| 绿春县| 黄平县| 江川县| 陈巴尔虎旗| 隆子县| 富平县| 禄劝| 宾川县| 商南县| 刚察县| 渭源县| 安吉县| 平山县| 新泰市| 南岸区| 扎赉特旗| 乌拉特后旗| 麻城市| 托克逊县| 当涂县| 南陵县| 紫金县| 天水市| 南康市| 宝鸡市| 盐山县| 府谷县| 河北区| 金湖县| 秦安县| 新干县| 融水| 喀喇| 鄂州市| 集安市| 玛曲县| 蕉岭县| 江西省| 丰都县|