文件名称:Hacking with Kali (用Kali进行Hack)
文件大小:8.43MB
文件格式:PDF
更新时间:2021-11-15 02:50:02
Kali Hack Hacker 安全 渗透测试
This book will walk the reader through the penetration testing lifecycle using the most advanced live disk available today, Kali Linux. AĞer this brief introduction, the chapter details how to find, download, install, and customize Kali Linux. Next a brief introduction to basic Linux configurations and seĴings will ensure basic commands and seĴings are understood. The remainder of the book is devoted to the penetration testing lifecycle—Reconnaissance, Scanning, Exploitation, Maintaining Access, and Reporting. While there are hundreds of different tools on the Kali Linux distribution, each chapter covering the penetration testing lifecycle will cover the tools most commonly used in that phase. The reporting phase will detail reports that can be used to present findings to management and leadership and a Rules of Engagement (ROE) template that can be used before beginning a penetration test.