官术网_书友最值得收藏!

Preface

This book is dedicated to the use of Kali Linux to perform penetration tests on networks, systems, and applications. A penetration test simulates an attack against a network or a system by a malicious outsider or insider. Unlike a vulnerability assessment, penetration testing is designed to include the exploitation phase. Therefore, it proves that the exploit is present, and that it is accompanied by the very real risk of being compromised if not acted upon.

Throughout this book, we will refer to penetration testers, attackers, and hackers interchangeably, as they use the same techniques and tools to assess the security of networks and data systems. The only difference between them is their end objective–a secure data network, or a data breach.

In short, this book will take you through penetration testing with a number of proven techniques to defeat the latest defenses on a network using Kali Linux, from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.

主站蜘蛛池模板: 望奎县| 朝阳县| 郁南县| 高州市| 中方县| 金坛市| 沈丘县| 梨树县| 浙江省| 长岭县| 繁峙县| 中江县| 益阳市| 孟津县| 泸定县| 大余县| 建德市| 聊城市| 格尔木市| 临武县| 荔波县| 敦化市| 大足县| 拜城县| 石门县| 甘孜| 南木林县| 合川市| 连江县| 垦利县| 神池县| 德庆县| 天津市| 佛坪县| 永城市| 榆林市| 阜南县| 西吉县| 大田县| 乐业县| 葫芦岛市|