官术网_书友最值得收藏!

Summary

In this chapter, we examined Kali, a collection of tools widely used by legitimate penetration testers and hackers to assess the security of data systems and networks. We emphasized Kali as a virtual machine, allowing both the host operating system and the VM guest to support testing.

Kali is a repository of tools, and one of the challenges in using it is ensuring that the tools are up-to-date. We reviewed the Debian packet management system, and how updates could be initiated from both the command line and from GUI applications. Most importantly, we learned how to customize Kali to increase the security of our tools and the data that they collect. We are working to achieve the goal of making tools support our process, instead of the other way around!

In the next chapter, we will learn how to effectively use Open Source Intelligence (OSINT) to identify the vulnerable attack surfaces of our target and create customized username:password lists to facilitate social engineering attacks and other exploits.

主站蜘蛛池模板: 关岭| 营山县| 刚察县| 宁国市| 融水| 彭山县| 淮阳县| 青海省| 钟祥市| 阜平县| 海口市| 花莲县| 响水县| 神农架林区| 大埔区| 霍州市| 梅州市| 永平县| 泰和县| 普宁市| 巧家县| 横山县| 山丹县| 张家川| 新巴尔虎左旗| 观塘区| 吴桥县| 突泉县| 昌吉市| 聊城市| 江达县| 于都县| 蓝田县| 旌德县| 凌云县| 黄浦区| 潜江市| 河源市| 马关县| 抚远县| 黄山市|