上QQ阅读APP看书,第一时间看更新
Summary
In this chapter, we explored the benefits and convenience of conducting a penetration test using a handheld device such as a smartphone or tablet. Then we covered Kali Linux’s mobile platform, NetHunter. We discussed the unique tools and utilities that are preloaded on the Kali NetHunter platform. We learned about the Android Security Model and explored its security features, which are implemented to help protect Android users. We closed the chapter by covering how to install Kali NetHunter.
In the next chapter, we will explore the methodologies of penetration testing and its phases.