官术网_书友最值得收藏!

What you need for this book

To follow and recreate the recipes of this book, you will need two systems. One can be your pen-testing system and the other can be your target. Alternatively, you can also work with a single system and set up a penetration testing environment by using any virtualization software.

Apart from that you will require an ISO image of BackTrack 5 which has pre-installed Metasploit and other tools that we will be discussing in this book. Alternatively, you can download the Metasploit framework separately for your preferred operating system from its official website.

主站蜘蛛池模板: 建阳市| 金溪县| 宜兰县| 潜山县| 通榆县| 泰安市| 建始县| 分宜县| 保德县| 榆林市| 攀枝花市| 仁化县| 萍乡市| 盘锦市| 宣化县| 合川市| 东台市| 腾冲县| 长泰县| 绥阳县| 晋中市| 孟州市| 雅江县| 靖远县| 连城县| 福鼎市| 遂昌县| 安仁县| 天台县| 偃师市| 南郑县| 保山市| 兴业县| 桃园县| 阿瓦提县| 故城县| 秀山| 三河市| 会宁县| 广南县| 南雄市|