- Mastering Reverse Engineering
- Reginald Wong
- 132字
- 2021-06-10 19:40:19
Technical requirements
We will work in an environment that will make use of virtualization software. It is recommended that we have a physical machine with virtualization enabled and a processor with at least four cores, 4 GB of RAM, and 250 GB of disk space. Pre-install this physical machine with either the Windows or Linux operating system.
We will be using VirtualBox in our setup. The host operating system version of Windows or Linux will depend on the requirements of VirtualBox. See the latest version of VirtualBox at https://www.virtualbox.org/ and look for the recommended requirements.
You may need to download virtual machines from Microsoft in advance, as these may take some time to download. See the developers' page at https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/. Windows 10 can be downloaded from the following link: https://www.microsoft.com/en-us/software-download/windows10
- 云原生安全:攻防實踐與體系構建
- Metasploit Penetration Testing Cookbook(Third Edition)
- 為你護航:網絡空間安全科普讀本(第2版)
- 黑客攻防入門秘笈
- 計算機病毒原理與防范(第2版)
- 工業控制網絡安全技術
- Kali Linux Network Scanning Cookbook(Second Edition)
- 網絡運維親歷記 (網絡運維紀實文學)
- 零信任網絡:在不可信網絡中構建安全系統(第2版)
- 局域網交換機安全
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 網絡安全大數據分析與實戰
- 功能型密碼算法設計與分析
- 網絡攻防實戰研究:MySQL數據庫安全
- Learn Azure Sentinel