官术网_书友最值得收藏!

Summary

In this chapter, we had a journey into different goal-based penetration testing methodologies that help organizations to test themselves against real-time attacks. We saw how penetration testers can use Kali in multiple different platforms to assess the security of data systems and networks. We have taken a dive into installing Kali on different virtualized platforms and have looked at how quickly we can run a Linux operating system on the Windows platform using Docker.

We built our own verification lab, set up Active Directory Domain Services, and also set up two different virtual machines on the same network. Most importantly, you learned how to customize Kali to increase the security of our tools and the data that they collect. We are working to achieve the goal of making tools support our process, instead of the other way around!

In the next chapter, you will learn how to effectively master Open Source Intelligence (OSINT) to identify the vulnerable attack surfaces of our target and create customized username-password lists to facilitate more focused attacks and other exploits.

主站蜘蛛池模板: 汉中市| 宽甸| 达拉特旗| 遂平县| 钟山县| 黔江区| 自治县| 平顺县| 和政县| 克拉玛依市| 云和县| 库尔勒市| 米泉市| 元阳县| 南华县| 抚远县| 泸西县| 天长市| 高碑店市| 甘谷县| 枣阳市| 运城市| 云安县| 八宿县| 诸暨市| 桐梓县| 绩溪县| 个旧市| 平顺县| 舒兰市| 怀远县| 于都县| 沅陵县| 波密县| 陈巴尔虎旗| 台中市| 宁河县| 满洲里市| 西乡县| 江油市| 九龙县|