This book will walk the reader through the penetration testing lifecycle usingthe most advanced live disk available today, Kali Linux. After this brief introduction,the chapter details how to find, download, install, and customizeKali Linux. Next a brief introduction to basic Linux configurations and settingswill ensure basic commands and settings are understood. The remainder ofthe book is devoted to the penetration testing lifecycle—Reconnaissance,Scanning, Exploitation, Maintaining Access, and Reporting. While there arehundreds of different tools on the Kali Linux distribution, each chapter coveringthe penetration testing lifecycle will cover the tools most commonly usedin that phase. The reporting phase will detail reports that can be used to presentfindings to management and leadership and a Rules of Engagement (ROE)template that can be used before beginning a penetration test.
đang được dịch, vui lòng đợi..