官术网_书友最值得收藏!

What you need for this book

To maximize the demonstrations in this book, you will need to have a computer or other device in which to install Kali Linux, as well as a deliberately vulnerable operating system. For this book, Metasploitable2 and Windows XP Mode were utilized. Both of these are virtual machines that are free to users. In addition, having access to a wireless access point to configure a wireless network will allow you to follow later chapters that address wireless penetration testing.

主站蜘蛛池模板: 稻城县| 广昌县| 来凤县| 昌宁县| 桐城市| 石阡县| 临西县| 漾濞| 大洼县| 开封市| 灵璧县| 开封市| 平顶山市| 鹤庆县| 山西省| 渑池县| 永定县| 高密市| 高邮市| 额尔古纳市| 芮城县| 抚顺市| 巴彦淖尔市| 福建省| 双辽市| 略阳县| 金乡县| 莱西市| 嘉祥县| 海城市| 华坪县| 南溪县| 竹溪县| 神池县| 康乐县| 长海县| 黄平县| 伊川县| 河曲县| 白玉县| 海晏县|