Skip to content

theocharistr/Computer-Security-KaliLinux

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Computer Security and Hacking with KaliLinux

Hacking cycle: Enumeration phase, Vulnerability Identification, Vulnerability Exploitation, Limited code Execution, Privilege escalation.
Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments
Kali Linux tools and software used: Nmap, Dirb, BurpSuite, Sqlmap, ftp, ssh, John the ripper.