官术网_书友最值得收藏!

Preface

This book is dedicated to the use of Kali Linux to perform penetration tests on networks, systems, and applications. A penetration test simulates an attack against a network or a system by a malicious outsider or insider. Unlike a vulnerability assessment, penetration testing is designed to include the exploitation phase. Therefore, it proves that the exploit is present, and that it is accompanied by the very real risk of being compromised if not acted upon.

Throughout this book, we will refer to penetration testers, attackers, and hackers interchangeably, as they use the same techniques and tools to assess the security of networks and data systems. The only difference between them is their end objective–a secure data network, or a data breach.

In short, this book will take you through penetration testing with a number of proven techniques to defeat the latest defenses on a network using Kali Linux, from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.

主站蜘蛛池模板: 海盐县| 永泰县| 泉州市| 武城县| 柳河县| 平安县| 邵武市| 瑞丽市| 七台河市| 科技| 上饶市| 张家川| 远安县| 贺兰县| 沂水县| 玛多县| 娱乐| 萨迦县| 丰宁| 晋州市| 安达市| 奉化市| 伊吾县| 岳普湖县| 明星| 盐源县| 镇康县| 五指山市| 黔西县| 云龙县| 新邵县| 辽阳县| 阿城市| 灵丘县| 五峰| 砀山县| 阿鲁科尔沁旗| 商南县| 林周县| 长宁区| 合山市|