Technical requirements
- Minimal hardware requirements: 6 GB RAM, quad-core 2.4 GHz processor, 500 GB HDD
- VirtualBox: https://www.virtualbox.org/wiki/Downloads
- Metasploitable 2: https://sourceforge.net/projects/metasploitable/files/Metasploitable2/
- Packer: https://www.packer.io/downloads.html
- Vagrant: https://www.vagrantup.com/downloads.html
- Metasploitble 3 (300 MB file)
- Metasploitable 3 (6 GB .ova file for VirtualBox): https://mega.nz/#!XQxEAABQ!frdh5DgZE-tSb_1ajPwLZrV4EZuj1lsS3WlWoLPvBjI
- The BadStore vulnerable web server: https://d396qusza40orc.cloudfront.net/softwaresec/virtual_machine/BadStore_212.iso
推薦閱讀
- Extending Symfony2 Web Application Framework
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- Metasploit Penetration Testing Cookbook(Third Edition)
- API安全實(shí)戰(zhàn)
- 網(wǎng)絡(luò)安全保障能力研究
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- CSO進(jìn)階之路:從安全工程師到首席安全官
- 安全防御入門(mén)手冊(cè)
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- Mastering Malware Analysis
- Securing Network Infrastructure
- Kali Linux無(wú)線網(wǎng)絡(luò)滲透測(cè)試詳解
- 黑客攻防從入門(mén)到精通:黑客與反黑客工具篇(第2版)
- Hands-On Bug Hunting for Penetration Testers
- 2010年中國(guó)互聯(lián)網(wǎng)網(wǎng)絡(luò)安全報(bào)告