官术网_书友最值得收藏!

Summary

In this chapter, we looked at some brief descriptions of the topics that will be thoroughly covered in this book. We discussed using a Linux machine to hack a computer with the Windows operating system. Then, we learned about the concept of hacking through the use of real-time examples. The different types of hackers were discussed. Finally, we saw various applications involved in hacking.

In the following chapter, we will set up a virtual environment to perform various penetration tests. We will also install Kali Linux, Windows, and Metaspoitable machines.

主站蜘蛛池模板: 泗阳县| 板桥市| 德昌县| 中阳县| 平南县| 商河县| 齐齐哈尔市| 南康市| 伊金霍洛旗| 唐山市| 玛曲县| 巫山县| 乐清市| 拉萨市| 灯塔市| 寿宁县| 潼南县| 涞水县| 安吉县| 巴林左旗| 崇文区| 苏尼特左旗| 南通市| 蕉岭县| 吉木乃县| 休宁县| 宁安市| 广东省| 岳池县| 德保县| 民县| 新密市| 和林格尔县| 太谷县| 平凉市| 油尖旺区| 冀州市| 大连市| 比如县| 韶关市| 漳平市|