- Kali Linux Network Scanning Cookbook
- Justin Hutchens
- 137字
- 2021-09-03 09:58:01
Chapter 1. Getting Started
This first chapter covers the basics of setting up and configuring a virtual security lab, which can be used to practice most of the scenarios and exercises addressed throughout this book. Topics addressed in this chapter include the installation of the virtualization software, the installation of various systems in the virtual environment, and the configuration of some of the tools that will be used in the exercises. The following recipes will be covered in this chapter:
- Configuring a security lab with VMware Player (Windows)
- Configuring a security lab with VMware Fusion (Mac OS X)
- Installing Ubuntu Server
- Installing Metasploitable2
- Installing Windows Server
- Increasing the Windows attack surface
- Installing Kali Linux
- Configuring and using SSH
- Installing Nessus on Kali Linux
- Configuring Burp Suite on Kali Linux
- Using text editors (VIM and Nano)
推薦閱讀
- 攻守道:企業數字業務安全風險與防范
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 網絡安全保障能力研究
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- Kali Linux Wireless Penetration Testing Cookbook
- Kali Linux Network Scanning Cookbook(Second Edition)
- 計算機網絡安全技術研究
- 云原生安全技術實踐指南
- Digital Forensics with Kali Linux
- 黑客攻防實戰從入門到精通
- Kali Linux高級滲透測試(原書第4版)
- 黑客攻防從入門到精通:命令版
- 社會工程:防范釣魚欺詐(卷3)
- 密碼朋克:自由與互聯網的未來
- 工業控制系統網絡安全實戰