Summary

In this chapter, we learned that Kali Linux in a virtual environment can be effectively used to perform vulnerability assessment and penetration tests. We also went through some absolute basics about Kali Linux and configure its environment.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.2.15