上QQ阅读APP看书,第一时间看更新
Section 2: Exploitation
In this section, you will start actively working with the various tools within Kali Linux. You will learn how to perform a multitude of tasks spanning across the various stages of a penetration test. The aim here is to exploit the target, so we will be working with attacks focused on social engineering, Metasploit, and more. We will cover multiple technologies here, such as wireless networks and web applications.
The following chapters will be covered in this section: