- Kali Linux Cookbook(Second Edition)
- Corey P. Schultz Bob Perciaccante
- 155字
- 2021-07-02 18:27:17
There's more...
The preceding resources will be installed on a variety of different methods that are beyond the scope of this book. But I will quickly mention some of the deployment options:
- Virtual machines that, can be installed in VirtualBox
- Scripts that can be run on standard Linux machines to build applications and make them specifically vulnerable to attacks
- Resources that you may attack over the internet
- Complete self contained hacking environments
Please ensure that as you are working with these sites, you read carefully the terms of service and understand all requirements and limitations of the environment or tools you are working with. Also be careful if you are remotely hacking sites across the internet. Although there are some of these options available for testing and it may be perfectly legal to do so, your Internet Service Provider ( ISP) may flag the activity as malicious and take action against you.
推薦閱讀
- Learning Cython Programming(Second Edition)
- Java 9 Concurrency Cookbook(Second Edition)
- Programming ArcGIS 10.1 with Python Cookbook
- Apache Spark Graph Processing
- 數據結構案例教程(C/C++版)
- Python+Tableau數據可視化之美
- Qt5 C++ GUI Programming Cookbook
- HTML5移動Web開發
- Java EE項目應用開發
- 大話代碼架構:項目實戰版
- Java EE 7 Development with WildFly
- Mobile Test Automation with Appium
- 三步學Python
- Python 3.8編程快速入門
- Git Version Control Cookbook