- Kali Linux Cookbook
- Willie L. Pritchett David De Smet
- 137字
- 2021-07-23 16:08:08
Introduction
Now that you have learned about the tools that are included in Kali Linux, we will now proceed to investigate some real-world scenarios. Many of the attacks we performed were performed intentionally on vulnerable software and systems. However, it is unlikely that when you use Kali to attack a system, it will be as unprotected as our current test platform.
In this chapter, we will explore techniques to set up some realistic testing environments. In the current state of information technology, most businesses use Platform as a Service (PAAS) solutions, Cloud Server hosts, or employ a small network comprising of desktops, servers, and a firewall (standalone) or firewall/router combination. We will set up these environments and then launch attacks against them.
The end goal of all of our attacks will be to gain root level access.
- Microsoft Dynamics CRM Customization Essentials
- 網絡服務器架設(Windows Server+Linux Server)
- 錯覺:AI 如何通過數據挖掘誤導我們
- Maya極速引擎:材質篇
- C語言開發技術詳解
- 運動控制器與交流伺服系統的調試和應用
- 運動控制系統應用與實踐
- Linux:Powerful Server Administration
- Learning Azure Cosmos DB
- 筆記本電腦維修90個精選實例
- 深度學習與目標檢測
- Salesforce Advanced Administrator Certification Guide
- Visual C++項目開發案例精粹
- SQL Server數據庫應用基礎(第2版)
- 大數據:引爆新的價值點