官术网_书友最值得收藏!

Summary

In this chapter, we began to build a solid foundation as you learned about penetration testing and how it differs from vulnerability and red team assessments. We defined the importance of leveraging a methodology or standard for penetration testing, such as the PTES standard and the various phases within it. Within each phase, we discussed what is involved and highlighted some important facets that should not be overlooked, such as the "get out of jail free card". Lastly, we looked at a lab environment, the various hypervisors that currently exist, and how to build a Metasploitable lab environment for future use.

In the next chapter (Chapter 2, Getting Started with Kali Linux), we will dive into Kali Linux to explore the different install options for Kali Linux and some initial configuration that is required. We will explore some of the essential tools within Kali Linux and what their main uses are.

主站蜘蛛池模板: 鞍山市| 密山市| 南昌县| 灵山县| 新密市| 资溪县| 新营市| 拜城县| 彩票| 苍梧县| 塔河县| 甘泉县| 揭西县| 文水县| 周至县| 洪湖市| 泽库县| 永嘉县| 巴中市| 山丹县| 藁城市| 定日县| 昌江| 镇安县| 基隆市| 杭锦后旗| 江津市| 浏阳市| 嘉禾县| 纳雍县| 红河县| 古蔺县| 兴安县| 涿鹿县| 博客| 桐梓县| 沙雅县| 项城市| 吕梁市| 义马市| 天祝|