Technical requirements
In order to follow along with this chapter, you will need the following:
- Kali Linux 2022.1 or later
- Metasploitable 2
- unix-privsec-check
- Netcat
- TightVNC
- chkrootkit
- rkhunter
In order to follow along with this chapter, you will need the following: