官术网_书友最值得收藏!

What you need for this book

Readers should have a basic understanding of web applications, networking concepts, and penetration testing methodology. This book will include detailed examples of how to execute an attack using the tools offered in Kali Linux. It is not required but beneficial to have experience using previous versions of Kali Linux.

The software requirements for building a lab environment and installing Kali Linux are covered in Chapter 2, Setting up Your Lab with Kali Linux.

主站蜘蛛池模板: 苍山县| 佛冈县| 普格县| 从江县| 黄冈市| 柳林县| 黄冈市| 曲沃县| 贺州市| 高清| 宜阳县| 麟游县| 扎兰屯市| 靖江市| 商城县| 潞西市| 泽库县| 全椒县| 金寨县| 平陆县| 榆社县| 申扎县| 莆田市| 涿鹿县| 格尔木市| 迭部县| 大新县| 阿巴嘎旗| 灵台县| 九龙县| 信丰县| 漠河县| 景德镇市| 偏关县| 博白县| 柯坪县| 新沂市| 新竹市| 江安县| 沁源县| 陇西县|