Firefox window is shown in the backdrop. Home Dolphin dialog box is on the left depicting folders as different icons. Overview of System Monitor dialog box is on the right. Spaces in memory, disk, and C P U are shown as donut charts.

Back to Figure

Vagrant is indicated at bottom left of the desktop. The icons are listed in the menu as follows: Favorites, Recently Used, All Applications, 01 Information Gathering, 02 Vulnerability Analysis, 03 Web Application Analysis, 04 Database Assessment, 05 Password Attacks, 06 Wireless Attacks, 07 Reverse Engineering, 08 Exploitation Tools, 09 Sniffing and Spoofing, 10 Post Exploitation, 11 Forensics, 12 Reporting Tools, 13 Social Engineering Tools, 42 Kali and Off Sec Links, Settings, and Usual Applications. ...

Get Ethical Hacking: Techniques, Tools, and Countermeasures, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.