官术网_书友最值得收藏!

Summary

When looking at the vast array of tools in the latest version of Kali Linux, we can see that there is functionality for a wide variety of security tasks. These include digital forensics, wireless security assessments, reverse engineering software, hacking hardware, and penetration testing.

There was also a discussion on the variety of ways that Kali Linux can be deployed. There is the ability to deploy Kali Linux using a live DVD or USB or SD card, installing it as a virtual machine, and also using it as the primary operating system on a standalone system or even in the cloud.

As with any other software, Kali Linux also needs to be updated, whether we only update the software applications or the Linux kernel included in the distribution.

In the next chapter, we will look at setting up our pentesting lab.

主站蜘蛛池模板: 华阴市| 泰州市| 淅川县| 鄂伦春自治旗| 鄢陵县| 霍林郭勒市| 郓城县| 天镇县| 焦作市| 轮台县| 玉山县| 中卫市| 万安县| 荃湾区| 沙坪坝区| 元江| 凤冈县| 修文县| 巨鹿县| 茂名市| 明溪县| 蓬溪县| 吉安市| 沛县| 凌云县| 陆川县| 广平县| 泾阳县| 汉寿县| 神池县| 金昌市| 滦平县| 库尔勒市| 南部县| 抚宁县| 纳雍县| 崇明县| 新余市| 化隆| 平邑县| 泽州县|