- Kali Linux Network Scanning Cookbook
- Justin Hutchens
- 186字
- 2021-09-03 09:57:59
What you need for this book
To follow the exercises addressed in this book or to further explore on your own, you will need the following components:
- A single personal computer (Mac, Windows, or Linux) with sufficient resources that can be shared across multiple virtual machines. At minimum, you should have 2 GB of RAM. It is recommended that for optimal performance, you use a system with 8 to 16 GB of RAM. Multiple processors and/or processor cores is also recommended.
- If you are running a system with limited resources, try to minimize the number of virtual machines that are running simultaneously when completing the exercises
- A virtualization software to run your security lab environment. Some of the available options include the following:
- VMware Fusion (Mac OS X)
- VMware Player (Windows)
- Oracle VirtualBox (Windows, Mac OS X, or Linux)
- Multiple operating systems to run in the security lab environment. Acquisition and installation of each of these will be discussed in detail in Chapter 1, Getting Started. The operating systems needed include the following:
- Kali Linux
- Metasploitable2
- An Ubuntu server
- Windows OS (Windows XP SP2 is recommended)
推薦閱讀
- Kali Linux Social Engineering
- 工業互聯網安全
- 網絡安全保障能力研究
- Practical Network Scanning
- 零信任網絡:在不可信網絡中構建安全系統
- Wireshark 2 Quick Start Guide
- Enterprise Cloud Security and Governance
- 移動APT:威脅情報分析與數據防護
- 信息安全案例教程:技術與應用(第2版)
- 網絡安全大數據分析與實戰
- 捍衛隱私
- 網絡安全監控實戰:深入理解事件檢測與響應
- 網絡安全技術及應用實踐教程
- INSTANT Penetration Testing:Setting Up a Test Lab How-to
- 數據中心安全防護技術