登录 注册
当前位置:主页 > 资源下载 > 50 > 使用Kali进行黑客攻击

使用Kali进行黑客攻击

  • 更新:2024-09-04 16:28:26
  • 大小:8.43MB
  • 推荐:★★★★★
  • 来源:网友上传分享
  • 类别:网络攻防 - 安全技术
  • 格式:PDF

资源介绍

This book will walk the reader through the penetration testing lifecycle using the most advanced live disk available today, Kali Linux. AĞer this brief introduction, the chapter details how to find, download, install, and customize Kali Linux. Next a brief introduction to basic Linux configurations and seĴings will ensure basic commands and seĴings are understood. The remainder of the book is devoted to the penetration testing lifecycle—Reconnaissance, Scanning, Exploitation, Maintaining Access, and Reporting. While there are hundreds of different tools on the Kali Linux distribution, each chapter covering the penetration testing lifecycle will cover the tools most commonly used in that phase. The reporting phase will detail reports that can be used to present findings to management and leadership and a Rules of Engagement (ROE) template that can be used before beginning a penetration test.