官术网_书友最值得收藏!

What you need for this book

To follow and recreate the examples in this book, you will need six to seven systems. One can be your penetration testing system--a box with Kali Linux installed--whereas others can be the systems under test. Alternatively, you can work on a single system and set up a virtual environment with host-only or bridged networks.

Apart from systems or virtualization, you will need the latest ISO of Kali Linux, which already packs Metasploit by default and contains all the other tools that are required for recreating the examples in this book.

You will also need to install Ubuntu 14.04 LTS, Windows XP, Windows 7 Home Basic, Windows Server 2008 R2, Windows Server 2012 R1, Metasploitable 2, Metasploitable 3, and Windows 10 either on virtual machines or live systems, as all these operating systems will serve as the test beds for Metasploit.

Additionally, links to all other required tools and vulnerable software are provided in the chapters.

主站蜘蛛池模板: 凤庆县| 南靖县| 乐平市| 宝鸡市| 通城县| 南阳市| 涡阳县| 措勤县| 乡宁县| 凯里市| 鄂伦春自治旗| 仙居县| 孝义市| 荥经县| 新邵县| 徐州市| 石阡县| 启东市| 永平县| 敖汉旗| 抚州市| 荆门市| 宝鸡市| 德江县| 改则县| 正宁县| 竹溪县| 南木林县| 汝南县| 九寨沟县| 高邮市| 会昌县| 林州市| 贵州省| 淮阳县| 滕州市| 长岭县| 莎车县| 黎川县| 霸州市| 德阳市|