Virtual machines and ISO images
The following table lists several virtual machines and ISO images that can be installed on your machine as targets to learn penetration testing:
URL |
Description |
---|---|
This contains various VMs to allow anyone to gain practical hands-on experience in digital security, computer application, and network administration. | |
This provides a variety of virtual machines, documentation, and challenges that can be used to learn about a variety of computer security issues, such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering, and general cyber security issues. | |
This provides various ... |
Get Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.