- Metasploit Penetration Testing Cookbook
- Abhinav Singh
- 98字
- 2021-08-13 18:21:07
What you need for this book
To follow and recreate the recipes of this book, you will need two systems. One can be your pen-testing system and the other can be your target. Alternatively, you can also work with a single system and set up a penetration testing environment by using any virtualization software.
Apart from that you will require an ISO image of BackTrack 5 which has pre-installed Metasploit and other tools that we will be discussing in this book. Alternatively, you can download the Metasploit framework separately for your preferred operating system from its official website.
推薦閱讀
- 高校網絡道德教育研究
- 物聯網關鍵技術及應用
- 中小型局域網組建、管理與維護實戰
- Socket.IO Real-time Web Application Development
- OMNeT++與網絡仿真
- INSTANT KineticJS Starter
- Building Web Applications with ArcGIS
- Cisco無線局域網配置基礎
- 互聯網戰略變革與未來
- 走近2050:注意力、互聯網與人工智能
- ElasticSearch Server
- 智慧的物聯網:感知中國和世界的技術
- 現場總線與工業以太網及其應用技術(第2版)
- Telerik WPF Controls Tutorial
- 網絡安全和信息化黨政領導干部一本通