Summary
In this chapter, we discovered a solid base of actions and knowledge that led to the cybersecurity stage as we see it today. We were able to follow a brief history of security developments and events that created the protective needs businesses have today. In doing so, we examined Stuxnet, one of the world’s first uses of modern computing technology for weaponization and cyberwarfare. From there, we looked at a cyberattack that affected individuals in the masses with the Target attack of 2013. We saw how these two attacks led to much of the technology we are about to work with throughout the rest of this book.
As we navigated both the red and blue team tools included in the Kali Purple distribution or made available to add to it, we started to piece together the full picture of a well-rounded cybersecurity system. We were able to begin seeing the greater potential of Kali Purple and watch it slowly emerge as a comprehensive one-stop-shop capable of providing a great...