官术网_书友最值得收藏!

To get the most out of this book

In order to gain the most benefit from the practical aspects of this book, you will need to have a virtualization environment set up. This can be set up using VMware or VirtualBox. Hyper-V will work, but there is a restriction that does not allow you to link a wireless card directly to the virtual machine. This prevents you from performing wireless attacks if you have a compatible wireless card.

The penetration testing operating system of choice is Kali Linux. Having some basic Linux knowledge is not mandatory, but would be beneficial. Kali Linux contains hundreds of tools. We do not focus on all of them, but only on the tools that would get the job done. Occasionally, we will look at tools that are available on the internet, but the installation and setup steps are clearly defined within the book.

The target systems used in this book are predominantly freely available, such as Metasploitable and OWASP BWA. We will work with Windows Server and Windows 10 as a target operating system in some chapters; the evaluation editions of these operating systems will suffice. Having knowledge of how to set up Active Directory would be beneficial.

Finally, this book does not focus on a specific target operating system, instead focusing on teaching you how to use various techniques, methodologies, and tools to obtain the results you need. Your knowledge will increase over time as you continue to apply what you have learned and gain experience by practicing your skills with various other vulnerable machines found on the internet.

主站蜘蛛池模板: 湟源县| 康乐县| 枣庄市| 紫阳县| 米林县| 南漳县| 东乌| 新龙县| 宁国市| 青川县| 南康市| 康马县| 如东县| 青田县| 乐都县| 花莲县| 南陵县| 福鼎市| 仲巴县| 库尔勒市| 巩义市| 汉中市| 绥芬河市| 宁海县| 望谟县| 黄平县| 遵义市| 乐至县| 金门县| 开平市| 德保县| 葫芦岛市| 陆良县| 北碚区| 临颍县| 安阳县| 辽阳县| 视频| 南江县| 东台市| 雷波县|