官术网_书友最值得收藏!

Preface

This book is dedicated to the use of Kali Linux to perform penetration tests on networks, systems, and applications. A penetration test simulates an attack against a network or a system by a malicious outsider or insider. Unlike a vulnerability assessment, penetration testing is designed to include the exploitation phase. Therefore, it proves that the exploit is present, and that it is accompanied by the very real risk of being compromised if not acted upon.

Throughout this book, we will refer to penetration testers, attackers, and hackers interchangeably, as they use the same techniques and tools to assess the security of networks and data systems. The only difference between them is their end objective–a secure data network, or a data breach.

In short, this book will take you through penetration testing with a number of proven techniques to defeat the latest defenses on a network using Kali Linux, from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.

主站蜘蛛池模板: 保靖县| 大关县| 郴州市| 崇义县| 平原县| 吴忠市| 和田县| 历史| 太保市| 大理市| 民权县| 东阳市| 墨玉县| 景德镇市| 龙游县| 小金县| 金阳县| 新化县| 松江区| 扎兰屯市| 达孜县| 建宁县| 东乌| 邵阳市| 榆社县| 南召县| 阿坝县| 若羌县| 建平县| 江永县| 大厂| 攀枝花市| 虎林市| 盐亭县| 贵南县| 北宁市| 庐江县| 华蓥市| 彝良县| 施甸县| 礼泉县|