官术网_书友最值得收藏!

What you need for this book

Readers should have a basic understanding of web applications, networking concepts, and penetration testing methodology. This book will include detailed examples of how to execute an attack using the tools offered in Kali Linux. It is not required but beneficial to have experience using previous versions of Kali Linux.

The software requirements for building a lab environment and installing Kali Linux are covered in Chapter 2, Setting up Your Lab with Kali Linux.

主站蜘蛛池模板: 扶风县| 宁强县| 罗甸县| 建宁县| 彭州市| 延边| 平原县| 南充市| 彭山县| 莱芜市| 莱西市| 上思县| 韶关市| 江安县| 周口市| 陆丰市| 宜州市| 塔河县| 富宁县| 宜兰县| 盐池县| 普格县| 辰溪县| 铜陵市| 铜陵市| 晋宁县| 郓城县| 额尔古纳市| 新宁县| 金门县| 威宁| 小金县| 故城县| 镶黄旗| 涪陵区| 河间市| 博白县| 酉阳| 新安县| 安阳市| 海丰县|