- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 168字
- 2021-07-16 11:33:19
Summary
In this chapter, we examined Kali, a collection of tools widely used by legitimate penetration testers and hackers to assess the security of data systems and networks. We emphasized Kali as a virtual machine, allowing both the host operating system and the VM guest to support testing.
Kali is a repository of tools, and one of the challenges in using it is ensuring that the tools are up-to-date. We reviewed the Debian packet management system, and how updates could be initiated from both the command line and from GUI applications. Most importantly, we learned how to customize Kali to increase the security of our tools and the data that they collect. We are working to achieve the goal of making tools support our process, instead of the other way around!
In the next chapter, we will learn how to effectively use Open Source Intelligence (OSINT) to identify the vulnerable attack surfaces of our target and create customized username:password lists to facilitate social engineering attacks and other exploits.
- 云原生安全:攻防實踐與體系構建
- Web漏洞分析與防范實戰:卷1
- Learning Python for Forensics
- 開發者的Web安全戒律:真實威脅與防御實踐
- Enterprise Cloud Security and Governance
- API攻防:Web API安全指南
- 情報驅動應急響應
- 信息安全等級保護測評與整改指導手冊
- 網絡安全態勢感知
- 黑客攻防實戰從入門到精通
- 網絡關鍵設備安全檢測實施指南
- 信息安全工程與實踐
- VMware vCloud Security
- Cybersecurity Threats,Malware Trends,and Strategies
- Hands-On Artificial Intelligence for Cybersecurity