官术网_书友最值得收藏!

Introduction

Now that you have learned about the tools that are included in Kali Linux, we will now proceed to investigate some real-world scenarios. Many of the attacks we performed were performed intentionally on vulnerable software and systems. However, it is unlikely that when you use Kali to attack a system, it will be as unprotected as our current test platform.

In this chapter, we will explore techniques to set up some realistic testing environments. In the current state of information technology, most businesses use Platform as a Service (PAAS) solutions, Cloud Server hosts, or employ a small network comprising of desktops, servers, and a firewall (standalone) or firewall/router combination. We will set up these environments and then launch attacks against them.

The end goal of all of our attacks will be to gain root level access.

主站蜘蛛池模板: 鲁甸县| 清镇市| 方正县| 涿州市| 民和| 兴海县| 南皮县| 英吉沙县| 陆丰市| 松江区| 康乐县| 筠连县| 盐城市| 海淀区| 民丰县| 南澳县| 五原县| 蓝山县| 甘肃省| 乐安县| 盱眙县| 双流县| 融水| 五大连池市| 和顺县| 乐山市| 磐石市| 潢川县| 金阳县| 上饶县| 上高县| 虹口区| 海兴县| 磐石市| 武定县| 息烽县| 临邑县| 台州市| 涿州市| 揭阳市| 郯城县|