资源介绍
This book will walk the reader through the penetration testing lifecycle using the most
advanced live disk available today, Kali Linux. AĞer this brief introduction, the chapter
details how to find, download, install, and customize Kali Linux. Next a brief
introduction to basic Linux configurations and seĴings will ensure basic commands and
seĴings are understood. The remainder of the book is devoted to the penetration testing
lifecycle—Reconnaissance, Scanning, Exploitation, Maintaining Access, and Reporting.
While there are hundreds of different tools on the Kali Linux distribution, each chapter
covering the penetration testing lifecycle will cover the tools most commonly used in that
phase. The reporting phase will detail reports that can be used to present findings to
management and leadership and a Rules of Engagement (ROE) template that can be used
before beginning a penetration test.
- 上一篇: kali linux 官方文档
- 下一篇: 宝丽通网络媒体播放器4.0.2.18版