官术网_书友最值得收藏!

What you need for this book

Readers should have a basic understanding of web applications, networking concepts, and penetration testing methodology. This book will include detailed examples of how to execute an attack using the tools offered in Kali Linux. It is not required but beneficial to have experience using previous versions of Kali Linux.

The software requirements for building a lab environment and installing Kali Linux are covered in Chapter 2, Setting up Your Lab with Kali Linux.

主站蜘蛛池模板: 囊谦县| 巴彦淖尔市| 沈阳市| 孟津县| 德惠市| 石家庄市| 庆元县| 手机| 新津县| 中超| 普洱| 上栗县| 神农架林区| 兰坪| 四子王旗| 安西县| 开原市| 洱源县| 泾源县| 咸宁市| 蓝田县| 马公市| 鄄城县| 鄂托克旗| 梧州市| 清镇市| 天水市| 定日县| 社旗县| 东辽县| 射洪县| 五莲县| 日土县| 延边| 广宗县| 达州市| 合作市| 万山特区| 历史| 嘉鱼县| 普陀区|