资讯

There are a variety of different ways to install Kali Linux, choosing the best one for your situation can make the process much easier. Here is a rundown of the possibilities.
Penetration testers must master Kali’s varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali.
In addition to Kali Linux, Offensive Security also maintains the Exploit Database and the free online course, Metasploit Unleashed.
An eventual Kali Linux 2.1 would simply be a snapshot of the current software available, which 2.0 users would already have upgraded to.