- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 168字
- 2021-07-16 11:33:19
Summary
In this chapter, we examined Kali, a collection of tools widely used by legitimate penetration testers and hackers to assess the security of data systems and networks. We emphasized Kali as a virtual machine, allowing both the host operating system and the VM guest to support testing.
Kali is a repository of tools, and one of the challenges in using it is ensuring that the tools are up-to-date. We reviewed the Debian packet management system, and how updates could be initiated from both the command line and from GUI applications. Most importantly, we learned how to customize Kali to increase the security of our tools and the data that they collect. We are working to achieve the goal of making tools support our process, instead of the other way around!
In the next chapter, we will learn how to effectively use Open Source Intelligence (OSINT) to identify the vulnerable attack surfaces of our target and create customized username:password lists to facilitate social engineering attacks and other exploits.
- Node Security
- 計算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Kali Linux Social Engineering
- Preventing Digital Extortion
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- Computer Forensics with FTK
- 云原生安全技術(shù)實踐指南
- 物聯(lián)網(wǎng)安全滲透測試技術(shù)
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實踐
- 構(gòu)建新型網(wǎng)絡(luò)形態(tài)下的網(wǎng)絡(luò)空間安全體系
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測與防御
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- 信息內(nèi)容安全管理及應(yīng)用
- Android Application Security Essentials