Technical requirements
To follow along with this chapter, you will need the following:
- Kali Linux 2022.1 or later.
- Nmap – network analysis tool.
- Metasploitable 2 (a vulnerable virtual machine that allows you to test ethical hacking). It can be downloaded from https://information.rapid7.com/download-metasploitable-2017.html.
- OpenVAS – Open Vulnerability Scanner.
- inSSIDer.
- Aircrack-ng.
- Kismet.
- cloud-enum.