SEC6070 Penetration Testing Methodology
Penetration testing in general, what separates Penetration testers (White hat hackers, the good guys) from Criminal Hackers (Black Hat Hackers, the bad guys). We will also be taking the first steps toward the creation of our own Penetration testing laboratories by installing Kali Linux as our distribution of choice for Penetration testing and Metasploitable Linux, a deliberately vulnerable Linux distribution to use as our target for attack. This week we will be covering the following topics: