- Kali Linux Cookbook
- Willie L. Pritchett David De Smet
- 137字
- 2021-07-23 16:08:08
Introduction
Now that you have learned about the tools that are included in Kali Linux, we will now proceed to investigate some real-world scenarios. Many of the attacks we performed were performed intentionally on vulnerable software and systems. However, it is unlikely that when you use Kali to attack a system, it will be as unprotected as our current test platform.
In this chapter, we will explore techniques to set up some realistic testing environments. In the current state of information technology, most businesses use Platform as a Service (PAAS) solutions, Cloud Server hosts, or employ a small network comprising of desktops, servers, and a firewall (standalone) or firewall/router combination. We will set up these environments and then launch attacks against them.
The end goal of all of our attacks will be to gain root level access.
- Microsoft Power BI Quick Start Guide
- 蕩胸生層云:C語言開發(fā)修行實錄
- 走入IBM小型機(jī)世界
- 快學(xué)Flash動畫百例
- JMAG電機(jī)電磁仿真分析與實例解析
- 自動生產(chǎn)線的拆裝與調(diào)試
- Windows 7寶典
- 運動控制器與交流伺服系統(tǒng)的調(diào)試和應(yīng)用
- 網(wǎng)絡(luò)化分布式系統(tǒng)預(yù)測控制
- 嵌入式GUI開發(fā)設(shè)計
- Linux系統(tǒng)下C程序開發(fā)詳解
- Linux Shell Scripting Cookbook(Third Edition)
- 貫通Java Web輕量級應(yīng)用開發(fā)
- 人工智能云平臺:原理、設(shè)計與應(yīng)用
- 精通ROS機(jī)器人編程(原書第2版)