官术网_书友最值得收藏!

  • Kali Linux Cookbook
  • Willie L. Pritchett David De Smet
  • 137字
  • 2021-07-23 16:08:08

Introduction

Now that you have learned about the tools that are included in Kali Linux, we will now proceed to investigate some real-world scenarios. Many of the attacks we performed were performed intentionally on vulnerable software and systems. However, it is unlikely that when you use Kali to attack a system, it will be as unprotected as our current test platform.

In this chapter, we will explore techniques to set up some realistic testing environments. In the current state of information technology, most businesses use Platform as a Service (PAAS) solutions, Cloud Server hosts, or employ a small network comprising of desktops, servers, and a firewall (standalone) or firewall/router combination. We will set up these environments and then launch attacks against them.

The end goal of all of our attacks will be to gain root level access.

主站蜘蛛池模板: 铜梁县| 藁城市| 措美县| 仙桃市| 广西| 都江堰市| 彭阳县| 萨嘎县| 花垣县| 太仓市| 石狮市| 都安| 永康市| 阿克苏市| 连州市| 山丹县| 武强县| 仁寿县| 襄汾县| 九龙县| 忻州市| 东安县| 长阳| 永泰县| 翁源县| 澄江县| 巨鹿县| 河间市| 临沂市| 虞城县| 南部县| 临沧市| 安多县| 唐海县| 珲春市| 遵义县| 潞西市| 榕江县| 渝中区| 阆中市| 莒南县|