官术网_书友最值得收藏!

Section 2: Exploitation

In this section, you will start actively working with the various tools within Kali Linux. You will learn how to perform a multitude of tasks spanning across the various stages of a penetration test. The aim here is to exploit the target, so we will be working with attacks focused on social engineering, Metasploit, and more. We will cover multiple technologies here, such as wireless networks and web applications.

The following chapters will be covered in this section:

主站蜘蛛池模板: 和田县| 萨嘎县| 时尚| 昆山市| 海宁市| 玉龙| 克东县| 涟水县| 兴业县| 建昌县| 绿春县| 博白县| 翼城县| 闻喜县| 固始县| 汕尾市| 岳西县| 霞浦县| 赤峰市| 洛阳市| 乐都县| 信宜市| 通城县| 长汀县| 呼图壁县| 临高县| 柘城县| 襄汾县| 女性| 塔河县| 南召县| 汝州市| 拉萨市| 阿巴嘎旗| 古交市| 常宁市| 江安县| 邻水| 澄城县| 安远县| 保亭|