官术网_书友最值得收藏!

Introduction

Now that you have learned about the tools that are included in Kali Linux, we will now proceed to investigate some real-world scenarios. Many of the attacks we performed were performed intentionally on vulnerable software and systems. However, it is unlikely that when you use Kali to attack a system, it will be as unprotected as our current test platform.

In this chapter, we will explore techniques to set up some realistic testing environments. In the current state of information technology, most businesses use Platform as a Service (PAAS) solutions, Cloud Server hosts, or employ a small network comprising of desktops, servers, and a firewall (standalone) or firewall/router combination. We will set up these environments and then launch attacks against them.

The end goal of all of our attacks will be to gain root level access.

主站蜘蛛池模板: 彰化县| 宜宾县| 岑巩县| 建湖县| 贵州省| 丽水市| 吴江市| 银川市| 加查县| 工布江达县| 中西区| 永胜县| 石柱| 敖汉旗| 东方市| 呈贡县| 西藏| 古蔺县| 华坪县| 宜兰市| 玛多县| 西藏| 牡丹江市| 泽州县| 临夏县| 敦煌市| 开化县| 宁明县| 南乐县| 万载县| 太白县| 耒阳市| 寿阳县| 甘洛县| 正阳县| 葫芦岛市| 葵青区| 夏津县| 二连浩特市| 阿克| 武穴市|