
上QQ阅读APP看书,第一时间看更新
Chapter 1. Getting Started - Setting Up an Environment
In this chapter, we will cover the basic tasks related to setting up Kali Linux for first time use. The recipes include:
- Installing Kali Linux on Cloud - Amazon AWS
- Installing Kali Linux on Docker
- Installing NetHunter on OnePlus One
- Installing Kali Linux on a virtual machine
- Customizing Kali Linux for faster package updates
- Customizing Kali Linux for faster operations
- Configuring remote connectivity services - HTTP, TFTP, and SSH
- Configuring Nessus and Metasploit
- Configuring third-party tools
- Installing Docker on Kali Linux