- Learn Ethical Hacking from Scratch
- Zaid Sabih
- 96字
- 2021-07-16 18:07:32
Summary
In this chapter, we learned what Kali Linux is, and the advantages of using it when it is installed on our virtual machine. After that, we looked through the GUI of Kali Linux, including various icons it has. We then used a few Linux commands that we are going to use in future chapters. Finally, we learned how we can update the resources of our system.
The upcoming chapters will focus on network penetration testing. Initially, we will learn all of the fundamentals; later, we will learn the attacks that we can perform on networks.
推薦閱讀
- 5G通信系統(tǒng)定位技術(shù)原理與方法
- 無線接入網(wǎng)同步性能測試技術(shù)
- 中壓電纜全壽命周期典型缺陷圖集
- 對話物聯(lián)網(wǎng)
- 2018—2019年中國無線電應(yīng)用與管理藍(lán)皮書
- 信息理論與編碼
- Network Programming with Rust
- 大規(guī)模天線波束賦形技術(shù)原理與設(shè)計
- 3D顯示技術(shù)
- 電子電路知識與實踐課堂
- 新型諾基亞手機(jī)維修技巧
- iOS開發(fā):從零基礎(chǔ)到精通
- 物聯(lián)產(chǎn)品電磁兼容分析與設(shè)計
- 彈性通信網(wǎng)絡(luò)技術(shù)
- 寬帶無線通信中的DigRF分析與設(shè)計