From charlesreid1

Notes on the "big picture" of how different types of tools and attacks fit together into a bigger picture of what you're trying to accomplish with Kali.

This may be an intrusive goal (i.e., take total control of a remote system). It may be a passive goal (i.e., monitor all traffic on a given network). The goal may involve escalating from Level 1 all the way up to Level 7, and on through multiple systems. Or, it may simply involve going from Level 2 to Level 3, and obtaining the necessary information from there.

Kali/Workflow is the main page for this topic.


This category has the following 3 subcategories, out of 3 total.