官术网_书友最值得收藏!

Summary

In this chapter, we examined Kali, a collection of tools widely used by legitimate penetration testers and hackers to assess the security of data systems and networks. We emphasized Kali as a virtual machine, allowing both the host operating system and the VM guest to support testing.

Kali is a repository of tools, and one of the challenges in using it is ensuring that the tools are up-to-date. We reviewed the Debian packet management system, and how updates could be initiated from both the command line and from GUI applications. Most importantly, we learned how to customize Kali to increase the security of our tools and the data that they collect. We are working to achieve the goal of making tools support our process, instead of the other way around!

In the next chapter, we will learn how to effectively use Open Source Intelligence (OSINT) to identify the vulnerable attack surfaces of our target and create customized username:password lists to facilitate social engineering attacks and other exploits.

主站蜘蛛池模板: 高尔夫| 拜城县| 毕节市| 五寨县| 板桥市| 古田县| 辛集市| 宁海县| 潮安县| 合山市| 顺平县| 宜城市| 大关县| 全椒县| 鄂托克旗| 海门市| 淮南市| 平泉县| 深泽县| 江川县| 柳江县| 邹平县| 昌乐县| 襄垣县| 疏勒县| 扬中市| 宣化县| 贵定县| 新兴县| 天水市| 乐都县| 巴里| 沽源县| 石家庄市| 德州市| 通许县| 呼伦贝尔市| 泾阳县| 神木县| 普兰县| 伊春市|