-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Python Ethical Hacking from Scratch
By :

We will need one OS to be used as an attack machine and one to be used as a target machine. In practical cases, most of the time, the attack machine is mostly a Linux distribution-based system and the target/victim machine will be a Windows-based system. We will use the term target and victim interchangeably throughout this book.
There are a lot of options for a pen testing machine. However, there are a few Linux-based distributions that stand out:
There are other options as well. However, I recommend using Kali Linux, since it's stable and widely used for pen testing. Kali has a lot of tools preconfigured, which can save a lot of time.
To download a virtual image for Kali Linux, go to Kali's download page: https://www.kali.org/downloads/.
Let's begin the installation process: