- Kali Linux Network Scanning Cookbook(Second Edition)
- Michael Hixon Justin Hutchens
- 67字
- 2021-07-09 20:36:01
How it works...
Metasploitable was built with the idea of security testing education in mind. This is a highly effective tool, but it must be handled with care. The Metasploitable system should never be exposed to any untrusted networks. It should never be assigned a publicly routable IP address, and port forwarding should not be used to make services accessible over the Network Address Translation (NAT) interface.