August 2018
Intermediate to advanced
254 pages
6h 20m
English
In this chapter, we learned that Kali Linux in a virtual environment can be effectively used to perform vulnerability assessment and penetration tests. We also went through some absolute basics about Kali Linux and configure its environment.
Read now
Unlock full access