Further reading
This chapter covered many topics. If you want to know more, here is a list of invaluable resources:
- [1] Herzog, P. (2010). OSSTMM 3. [online] Available at https://www.isecom.org/OSSTMM.3.pdf.
- [2] Kali.org. (2019). Our Most Advanced Penetration Testing Distribution, Ever. [online] Available at https://www.kali.org.
- [3] Faletra, L. (2013). The best choice for security experts, developers, and crypto-addicted people. [online] Parrot Security. Available at https://www.parrotsec.org/.
- [4] Canonical (2019). The leading operating system for PCs, IoT devices, servers, and the cloud | Ubuntu. [online] Ubuntu. Available at https://ubuntu.com/.
- [5] cygwin.com. (n.d.). Cygwin. [online] Available at https://cygwin.com.
- [6] craigloewen-msft (n.d.). Install WSL. [online] learn.microsoft.com. Available at https://learn.microsoft.com/en-us/windows/wsl/install.
- [7] Chocolatey. (2019). Chocolatey - The package manager for Windows. [online] Available at...