- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 168字
- 2021-07-16 11:33:19
Summary
In this chapter, we examined Kali, a collection of tools widely used by legitimate penetration testers and hackers to assess the security of data systems and networks. We emphasized Kali as a virtual machine, allowing both the host operating system and the VM guest to support testing.
Kali is a repository of tools, and one of the challenges in using it is ensuring that the tools are up-to-date. We reviewed the Debian packet management system, and how updates could be initiated from both the command line and from GUI applications. Most importantly, we learned how to customize Kali to increase the security of our tools and the data that they collect. We are working to achieve the goal of making tools support our process, instead of the other way around!
In the next chapter, we will learn how to effectively use Open Source Intelligence (OSINT) to identify the vulnerable attack surfaces of our target and create customized username:password lists to facilitate social engineering attacks and other exploits.
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- 工業(yè)互聯(lián)網(wǎng)安全
- Web安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- 工業(yè)控制網(wǎng)絡(luò)安全技術(shù)
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實(shí)踐指南
- End to End GUI Development with Qt5
- 黑客攻防從入門到精通
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- Mastering Malware Analysis
- 功能型密碼算法設(shè)計(jì)與分析
- 紅藍(lán)攻防:技術(shù)與策略(原書第3版)
- Instant OSSEC Host-based Intrusion Detection System
- 動態(tài)賦能網(wǎng)絡(luò)空間防御
- 大話數(shù)據(jù)恢復(fù)
- 商用密碼發(fā)展報告(2012—2017年)