官术网_书友最值得收藏!

What you need for this book

To maximize the demonstrations in this book, you will need to have a computer or other device in which to install Kali Linux, as well as a deliberately vulnerable operating system. For this book, Metasploitable2 and Windows XP Mode were utilized. Both of these are virtual machines that are free to users. In addition, having access to a wireless access point to configure a wireless network will allow you to follow later chapters that address wireless penetration testing.

主站蜘蛛池模板: 芦山县| 福建省| 玉溪市| 科技| 温宿县| 姚安县| 贵州省| 迁西县| 波密县| 酉阳| 那曲县| 惠安县| 东辽县| 山东省| 涿鹿县| 保山市| 德保县| 登封市| 维西| 政和县| 东丽区| 四平市| 临沭县| 惠水县| 丹江口市| 武强县| 比如县| 龙游县| 昭苏县| 安丘市| 凤冈县| 潞城市| 含山县| 德阳市| 靖安县| 秭归县| 盐津县| 楚雄市| 郧西县| 加查县| 平潭县|