- Kali Linux Cookbook
- Willie L. Pritchett David De Smet
- 137字
- 2021-07-23 16:08:08
Introduction
Now that you have learned about the tools that are included in Kali Linux, we will now proceed to investigate some real-world scenarios. Many of the attacks we performed were performed intentionally on vulnerable software and systems. However, it is unlikely that when you use Kali to attack a system, it will be as unprotected as our current test platform.
In this chapter, we will explore techniques to set up some realistic testing environments. In the current state of information technology, most businesses use Platform as a Service (PAAS) solutions, Cloud Server hosts, or employ a small network comprising of desktops, servers, and a firewall (standalone) or firewall/router combination. We will set up these environments and then launch attacks against them.
The end goal of all of our attacks will be to gain root level access.
- Microsoft Dynamics CRM Customization Essentials
- Learning Apache Cassandra(Second Edition)
- Windows XP中文版應用基礎
- 嵌入式Linux上的C語言編程實踐
- Visual Basic從初學到精通
- Docker Quick Start Guide
- PyTorch Deep Learning Hands-On
- 21天學通Visual C++
- 基于32位ColdFire構建嵌入式系統
- 激光選區熔化3D打印技術
- 所羅門的密碼
- 漢字錄入技能訓練
- Generative Adversarial Networks Projects
- Learning Couchbase
- Linux Administration Cookbook