官术网_书友最值得收藏!

Summary

In this chapter, we examined Kali, a collection of tools widely used by legitimate penetration testers and hackers to assess the security of data systems and networks. We emphasized Kali as a virtual machine, allowing both the host operating system and the VM guest to support testing.

Kali is a repository of tools, and one of the challenges in using it is ensuring that the tools are up-to-date. We reviewed the Debian packet management system, and how updates could be initiated from both the command line and from GUI applications. Most importantly, we learned how to customize Kali to increase the security of our tools and the data that they collect. We are working to achieve the goal of making tools support our process, instead of the other way around!

In the next chapter, we will learn how to effectively use Open Source Intelligence (OSINT) to identify the vulnerable attack surfaces of our target and create customized username:password lists to facilitate social engineering attacks and other exploits.

主站蜘蛛池模板: 尼木县| 栖霞市| 库伦旗| 博乐市| 石家庄市| 蒲江县| 大同县| 吉木乃县| 龙门县| 教育| 双鸭山市| 会昌县| 阿城市| 固镇县| 绍兴县| 林西县| 贵南县| 大方县| 临沧市| 永福县| 鹤壁市| 勃利县| 即墨市| 杭锦旗| 红安县| 邢台市| 类乌齐县| 文山县| 修武县| 隆尧县| 仪陇县| 靖安县| 安岳县| 四子王旗| 黑水县| 长宁区| 双柏县| 黔江区| 区。| 虹口区| 通许县|