Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually. If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you.After you fill in all the information, VirtualBox will store the virtual machine state; this process will take some time depending on ... Exporting. a. virtual. machine. There are times whenyou need to back upyourvirtual machineto a file or share youranbsp;...
|Title||:||Kali Linux – Assuring Security by Penetration Testing|
|Author||:||Lee Allen, Tedi Heriyanto, Shakeel Ali|
|Publisher||:||Packt Publishing Ltd - 2014-04-07|