Skip to content

Latest commit

 

History

History
4 lines (4 loc) · 426 Bytes

README.md

File metadata and controls

4 lines (4 loc) · 426 Bytes

Computer Security and Hacking with KaliLinux

Hacking cycle: Enumeration phase, Vulnerability Identification, Vulnerability Exploitation, Limited code Execution, Privilege escalation.
Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments
Kali Linux tools and software used: Nmap, Dirb, BurpSuite, Sqlmap, ftp, ssh, John the ripper.