官术网_书友最值得收藏!

Summary

In this chapter, we examined Kali, a collection of tools widely used by legitimate penetration testers and hackers to assess the security of data systems and networks. We emphasized Kali as a virtual machine, allowing both the host operating system and the VM guest to support testing.

Kali is a repository of tools, and one of the challenges in using it is ensuring that the tools are up-to-date. We reviewed the Debian packet management system, and how updates could be initiated from both the command line and from GUI applications. Most importantly, we learned how to customize Kali to increase the security of our tools and the data that they collect. We are working to achieve the goal of making tools support our process, instead of the other way around!

In the next chapter, we will learn how to effectively use Open Source Intelligence (OSINT) to identify the vulnerable attack surfaces of our target and create customized username:password lists to facilitate social engineering attacks and other exploits.

主站蜘蛛池模板: 简阳市| 陆丰市| 翁牛特旗| 措美县| 遂平县| 桦甸市| 石河子市| 长葛市| 兰州市| 潜山县| 岚皋县| 桐柏县| 托克逊县| 平塘县| 濉溪县| 西吉县| 朝阳市| 文登市| 中卫市| 武安市| 灵丘县| 凤阳县| 芜湖市| 即墨市| 上林县| 洛南县| 贵阳市| 洞口县| 崇文区| 民勤县| 华阴市| 鹤壁市| 巢湖市| 乌恰县| 色达县| 民县| 江山市| 顺义区| 新野县| 乌拉特中旗| 拜泉县|