Summary
During the course of this chapter, you have learned about various guidelines that will help you to become a better ethical hacker and penetration tester, and you have also discovered some of the key components of creating a penetration testing checklist, some fun tools for creating a hacker’s tool bag, and how to securely access your Kali Linux machine while performing penetration testing remotely.
Lastly, I know the journey of preparing to be an ethical hacker and penetration tester isn’t an easy one and there are many challenges along the path on the road to success. I would personally like to thank you very much for your support in purchasing a copy of my book and congratulations on making it to the end while acquiring all these amazing new skills in ethical hacking and penetration testing techniques and strategies using Kali Linux. I do hope everything you have learned throughout this book has been informative for you and helpful in your journey to becoming...