- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 79字
- 2021-06-24 15:59:14
Getting ready
Here is a list of some tools that we will need before we dive deeper into penetration testing. Don't worry, we will learn about their usage with some real-life examples in the next few chapters. But those of us who are excited about them right now can run the following simple commands to view the -help section where toolname is the name of the tool we would like to view the help of:
toolname -help
toolname -h
推薦閱讀
- 發布!設計與部署穩定的分布式系統(第2版)
- Mobile-first Bootstrap
- Ansible權威指南
- Linux操作系統應用編程
- Linux就該這么學
- Application Development in iOS 7
- 計算機應用基礎(Windows 7+Office 2016)
- 鴻蒙操作系統設計原理與架構
- Unity AR/VR開發:實戰高手訓練營
- Getting Started with Raspberry Pi Zero
- Mastering Spring Cloud
- 深入理解Android:卷III
- Serverless Architectures with AWS
- ZooKeeper+Dubbo 3分布式高性能RPC通信
- Getting Started with Oracle Public Cloud