This book will walk the reader through the penetration testing lifecycle using the most advanced live disk available today, Kali Linux. AĞer this brief introduction, the chapter details how to find, download, install, and customize Kali Linux. Next a brief introduction to basic Linux configurations and seĴings will ensure basic commands and seĴings are understood. The remainder of the book is devoted to the penetration testing lifecycle—Reconnaissance, Scanning, Exploitation, Maintaining Access, and Reporting. While there are hundreds of different tools on the Kali Linux distribution, each chapter covering the penetration testing lifecycle will cover the tools most commonly used in that phase. The reporting phase will detail reports that can be used to present findings to management and leadership and a Rules of Engagement (ROE) template that can be used before beginning a penetration test.
- 粉丝: 0
- 资源: 1
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助