What you need for this book
To maximize the demonstrations in this book, you will need to have a computer or other device in which to install Kali Linux, as well as a deliberately vulnerable operating system. For this book, Metasploitable2 and Windows XP Mode were utilized. Both of these are virtual machines that are free to users. In addition, having access to a wireless access point to configure a wireless network will allow you to follow later chapters that address wireless penetration testing.
推薦閱讀
- 玩轉(zhuǎn)Scratch少兒趣味編程
- Boost C++ Application Development Cookbook(Second Edition)
- 跟“龍哥”學(xué)C語(yǔ)言編程
- Magento 2 Theme Design(Second Edition)
- 精通軟件性能測(cè)試與LoadRunner實(shí)戰(zhàn)(第2版)
- Drupal 8 Module Development
- C# Multithreaded and Parallel Programming
- 計(jì)算機(jī)應(yīng)用基礎(chǔ)教程(Windows 7+Office 2010)
- ExtJS Web應(yīng)用程序開(kāi)發(fā)指南第2版
- Learning Nessus for Penetration Testing
- 程序員的成長(zhǎng)課
- Mastering SciPy
- Python滲透測(cè)試編程技術(shù):方法與實(shí)踐(第2版)
- Learning QGIS(Second Edition)
- Learning Java Lambdas