李華峰,多年來一直從事網(wǎng)絡安全方面的教學與研究工作。他同時是一位資深的信息安全顧問和自由撰稿人,在網(wǎng)絡安全部署、網(wǎng)絡攻擊與防御以及社會工程學等方面有十分豐富的實踐經(jīng)驗。已出版的著作和譯著包括:《精通Metasploit滲透測試(第2版)》《諸神之眼——Nmap網(wǎng)絡安全審計技術揭秘》《Python滲透測試編程技術:方法與實踐》《Wireshark網(wǎng)絡分析從入門到實踐》《Kali Linux 2網(wǎng)絡滲透測試實踐指南》等。
第2章 Kali Linux 2使用基礎··············9 2.1 簡介········································9 2.2 安裝Kali Linux 2······················10 2.2.1 在VMware虛擬機中安裝Kali Linux 2···············10 2.2.2 在樹莓派中安裝Kali Linux 2···12 2.3 Kali Linux 2的常用操作·············15 2.3.1 文件系統(tǒng)····························17 2.3.2 常用命令····························19 2.3.3 對Kali Linux 2的網(wǎng)絡進行配置·················21 2.3.4 在Kali Linux 2中安裝第三方應用程序·················25 2.3.5 對Kali Linux 2網(wǎng)絡進行SSH遠程控制····················25 2.3.6 Kali Linux 2的更新操作········29 2.4 VMware的高級操作··················29 2.4.1 在VMware中安裝其他操作系統(tǒng)···············29 2.4.2 VMware中的網(wǎng)絡連接··········30 2.4.3 VMware中的快照與克隆功能···················32 2.5 小結······································33