- Kali Linux 2018:Assuring Security by Penetration Testing
- Shiva V. N Parasram Alex Samm Damian Boodoo Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali
- 142字
- 2021-06-24 18:18:59
Summary
When looking at the vast array of tools in the latest version of Kali Linux, we can see that there is functionality for a wide variety of security tasks. These include digital forensics, wireless security assessments, reverse engineering software, hacking hardware, and penetration testing.
There was also a discussion on the variety of ways that Kali Linux can be deployed. There is the ability to deploy Kali Linux using a live DVD or USB or SD card, installing it as a virtual machine, and also using it as the primary operating system on a standalone system or even in the cloud.
As with any other software, Kali Linux also needs to be updated, whether we only update the software applications or the Linux kernel included in the distribution.
In the next chapter, we will look at setting up our pentesting lab.
- 特種木馬防御與檢測技術研究
- 等級保護測評理論及應用
- 反黑命令與攻防從新手到高手(微課超值版)
- 安全技術運營:方法與實踐
- Learning Veeam? Backup & Replication for VMware vSphere
- Learning Devise for Rails
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- 網絡安全能力成熟度模型:原理與實踐
- 解密彩虹團隊非凡實戰能力:企業安全體系建設(共5冊)
- Learning Pentesting for Android Devices
- 網絡攻防實戰研究:MySQL數據庫安全
- 云計算安全技術與應用
- CTF網絡安全競賽入門教程
- Blockchain Development with Hyperledger
- 中國網絡空間安全前沿科技發展報告(2018)