- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 176字
- 2021-07-02 21:04:12
Summary
In this chapter, we had a journey into different goal-based penetration testing methodologies that help organizations to test themselves against real-time attacks. We saw how penetration testers can use Kali in multiple different platforms to assess the security of data systems and networks. We have taken a dive into installing Kali on different virtualized platforms and have looked at how quickly we can run a Linux operating system on the Windows platform using Docker.
We built our own verification lab, set up Active Directory Domain Services, and also set up two different virtual machines on the same network. Most importantly, you learned how to customize Kali to increase the security of our tools and the data that they collect. We are working to achieve the goal of making tools support our process, instead of the other way around!
In the next chapter, you will learn how to effectively master Open Source Intelligence (OSINT) to identify the vulnerable attack surfaces of our target and create customized username-password lists to facilitate more focused attacks and other exploits.
- 大學(xué)計(jì)算機(jī)基礎(chǔ)(第二版)
- DB2 V9權(quán)威指南
- C# 從入門(mén)到項(xiàng)目實(shí)踐(超值版)
- 技術(shù)領(lǐng)導(dǎo)力:程序員如何才能帶團(tuán)隊(duì)
- x86匯編語(yǔ)言:從實(shí)模式到保護(hù)模式(第2版)
- aelf區(qū)塊鏈應(yīng)用架構(gòu)指南
- 深度學(xué)習(xí):算法入門(mén)與Keras編程實(shí)踐
- MySQL數(shù)據(jù)庫(kù)基礎(chǔ)實(shí)例教程(微課版)
- Advanced Oracle PL/SQL Developer's Guide(Second Edition)
- 深入理解Android:Wi-Fi、NFC和GPS卷
- 計(jì)算機(jī)應(yīng)用基礎(chǔ)項(xiàng)目化教程
- PyQt編程快速上手
- Python無(wú)監(jiān)督學(xué)習(xí)
- 深入大型數(shù)據(jù)集:并行與分布化Python代碼
- Developer,Advocate!