官术网_书友最值得收藏!

What you need for this book

To follow and recreate the examples in this book, you will need six to seven systems. One can be your penetration testing system--a box with Kali Linux installed--whereas others can be the systems under test. Alternatively, you can work on a single system and set up a virtual environment with host-only or bridged networks.

Apart from systems or virtualization, you will need the latest ISO of Kali Linux, which already packs Metasploit by default and contains all the other tools that are required for recreating the examples in this book.

You will also need to install Ubuntu 14.04 LTS, Windows XP, Windows 7 Home Basic, Windows Server 2008 R2, Windows Server 2012 R1, Metasploitable 2, Metasploitable 3, and Windows 10 either on virtual machines or live systems, as all these operating systems will serve as the test beds for Metasploit.

Additionally, links to all other required tools and vulnerable software are provided in the chapters.

主站蜘蛛池模板: 平乡县| 镇远县| 广饶县| 巴青县| 天长市| 高密市| 沙坪坝区| 义乌市| 南皮县| 阳曲县| 灵武市| 高阳县| 柳州市| 右玉县| 佳木斯市| 达尔| 江孜县| 松阳县| 克拉玛依市| 应用必备| 南昌市| 吉林市| 建瓯市| 龙山县| 信丰县| 平舆县| 孙吴县| 明水县| 克东县| 天全县| 东丰县| 白河县| 营口市| 大理市| 颍上县| 隆化县| 舟山市| 宁国市| 留坝县| 泊头市| 时尚|