What you need for this book
To maximize the demonstrations in this book, you will need to have a computer or other device in which to install Kali Linux, as well as a deliberately vulnerable operating system. For this book, Metasploitable2 and Windows XP Mode were utilized. Both of these are virtual machines that are free to users. In addition, having access to a wireless access point to configure a wireless network will allow you to follow later chapters that address wireless penetration testing.
推薦閱讀
- Designing Machine Learning Systems with Python
- Learning NServiceBus(Second Edition)
- Kali Linux Web Penetration Testing Cookbook
- C程序設計簡明教程(第二版)
- Learning SQLite for iOS
- 深入理解Java7:核心技術與最佳實踐
- Python程序設計
- Nginx Lua開發實戰
- Python機器學習算法: 原理、實現與案例
- 執劍而舞:用代碼創作藝術
- RESTful Java Web Services(Second Edition)
- INSTANT Yii 1.1 Application Development Starter
- HoloLens與混合現實開發
- 軟件測試綜合技術
- Oracle Data Guard 11gR2 Administration Beginner's Guide