官术网_书友最值得收藏!

Summary

In this chapter, we learned how to use VirtualBox, which allows us to install machines such as Kali Linux, and Windows, inside our own machine. We also learned how to install Kali Linux, which is going to be our attacking machine throughout the book, and how to install our victim machines, Windows and Metasploitable. Lastly, we studied what snapshots are, and how they can help us to retain our past setups in the virtual environment.

In upcoming chapters, we will see how to use the Kali Linux machine to attack both the Windows machine and the Metasploitable machine.

主站蜘蛛池模板: 曲沃县| 华阴市| 四会市| 景宁| 汨罗市| 高安市| 阿坝| 南平市| 个旧市| 阿巴嘎旗| 福贡县| 青神县| 江川县| 体育| 连州市| 琼海市| 黄龙县| 安泽县| 庆元县| 中牟县| 邻水| 宁远县| 易门县| 楚雄市| 西畴县| 那坡县| 栾川县| 河东区| 囊谦县| 电白县| 朝阳区| 奉新县| 澜沧| 施甸县| 乳山市| 翁牛特旗| 桃园市| 广宁县| 河西区| 新乡县| 石柱|