Hacking cycle: Enumeration phase, Vulnerability Identification, Vulnerability Exploitation, Limited code Execution, Privilege escalation.
Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments
Kali Linux tools and software used: Nmap, Dirb, BurpSuite, Sqlmap, ftp, ssh, John the ripper.
-
Notifications
You must be signed in to change notification settings - Fork 0
theocharistr/Computer-Security-KaliLinux
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Introduction to Computer Security with Kali Linux
Topics
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published