To work through this book, you will need to know how to install software on your computer. That’s it. You don’t need to be a Linux expert or know the nitty-gritty of how networking protocols work. When you encounter a topic that is not familiar to you, I encourage you to do some outside research beyond my explanations if you need to—but we will walk step-bystep through all the tools and techniques that may be new to you, starting with the Linux command line.
Topics of this book cover next chapters: Assessments, Attacks, Exploit Development and Mobile Hacking.
Завідуючий кафедрою зателефонує Вам як тільки отримає повідомлення.