官术网_书友最值得收藏!

What you need for this book

To maximize the demonstrations in this book, you will need to have a computer or other device in which to install Kali Linux, as well as a deliberately vulnerable operating system. For this book, Metasploitable2 and Windows XP Mode were utilized. Both of these are virtual machines that are free to users. In addition, having access to a wireless access point to configure a wireless network will allow you to follow later chapters that address wireless penetration testing.

主站蜘蛛池模板: 嘉荫县| 柞水县| 玉门市| 南通市| 托克托县| 景泰县| 阳东县| 淳化县| 科尔| 临高县| 乐昌市| 曲麻莱县| 拜泉县| 隆德县| 马鞍山市| 景洪市| 舒城县| 宁强县| 鲁山县| 玛多县| 阳信县| 盘锦市| 隆德县| 河北省| 兖州市| 望城县| 永州市| 黎平县| 天门市| 镇宁| 庄浪县| 威远县| 泾源县| 墨脱县| 中超| 中阳县| 化德县| 龙游县| 朝阳市| 微博| 江源县|