- Kali Linux 2:Assuring Security by Penetration Testing(Third Edition)
- Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali
- 84字
- 2021-08-20 10:28:26
What you need for this book
To maximize the demonstrations in this book, you will need to have a computer or other device in which to install Kali Linux, as well as a deliberately vulnerable operating system. For this book, Metasploitable2 and Windows XP Mode were utilized. Both of these are virtual machines that are free to users. In addition, having access to a wireless access point to configure a wireless network will allow you to follow later chapters that address wireless penetration testing.
推薦閱讀
- 程序員修煉之道:程序設(shè)計入門30講
- Java范例大全
- 信息可視化的藝術(shù):信息可視化在英國
- C++ Builder 6.0下OpenGL編程技術(shù)
- 三維圖形化C++趣味編程
- MATLAB應(yīng)用與實驗教程
- 面向STEM的Scratch創(chuàng)新課程
- R的極客理想:工具篇
- JavaScript動態(tài)網(wǎng)頁開發(fā)詳解
- 零基礎(chǔ)學(xué)單片機C語言程序設(shè)計
- 單片機C語言程序設(shè)計實訓(xùn)100例
- RealSenseTM互動開發(fā)實戰(zhàn)
- Java并發(fā)編程:核心方法與框架
- Java EE Web應(yīng)用開發(fā)基礎(chǔ)
- 深度實踐KVM:核心技術(shù)、管理運維、性能優(yōu)化與項目實施