legal notice and general remainder
This commit is contained in:
parent
4e746110fb
commit
c4dd8860fc
|
@ -4,6 +4,12 @@ title: Penetration Testing
|
||||||
permalink: /doc/pentesting/
|
permalink: /doc/pentesting/
|
||||||
---
|
---
|
||||||
|
|
||||||
|
**Legal notice:**
|
||||||
|
|
||||||
|
The usage of penetration testing tools outside your own laboratory environment requires the permission of the organization you attack. Penetration testing without such a permission can have legal consequences.
|
||||||
|
|
||||||
|
To avoid such legal conflicts please refer to the [Code of Ethics](https://www.eccouncil.org/Support/code-of-ethics).
|
||||||
|
|
||||||
Penetration Testing
|
Penetration Testing
|
||||||
===================
|
===================
|
||||||
|
|
||||||
|
|
|
@ -4,6 +4,14 @@ title: How to Create a BlackArch VM
|
||||||
permalink: /doc/blackarch/
|
permalink: /doc/blackarch/
|
||||||
---
|
---
|
||||||
|
|
||||||
|
**General Remainder:**
|
||||||
|
|
||||||
|
- The installation scripts and provided tools may have bugs, be vulnerable to Man in the Middle (MitM) attacks or other vulnerabilities.
|
||||||
|
|
||||||
|
- Adding additional repositories or tools for installing software extends your trust to those tool provider.
|
||||||
|
|
||||||
|
Please keep in mind that using such a VM or VM's based on the template for security and privacy critical tasks is not recommended.
|
||||||
|
|
||||||
How to Create a BlackArch VM
|
How to Create a BlackArch VM
|
||||||
============================
|
============================
|
||||||
|
|
||||||
|
|
|
@ -4,6 +4,14 @@ title: How to create a Kali Linux VM
|
||||||
permalink: /doc/kali/
|
permalink: /doc/kali/
|
||||||
---
|
---
|
||||||
|
|
||||||
|
**General Remainder:**
|
||||||
|
|
||||||
|
- The installation scripts and provided tools may have bugs, be vulnerable to Man in the Middle (MitM) attacks or other vulnerabilities.
|
||||||
|
|
||||||
|
- Adding additional repositories or tools for installing software extends your trust to those tool provider.
|
||||||
|
|
||||||
|
Please keep in mind that using such a VM or VM's based on the template for security and privacy critical tasks is not recommended.
|
||||||
|
|
||||||
How to Create a Kali Linux VM
|
How to Create a Kali Linux VM
|
||||||
=============================
|
=============================
|
||||||
|
|
||||||
|
|
|
@ -4,6 +4,14 @@ title: How to create Penetration Testers Framework (PTF) VM
|
||||||
permalink: /doc/ptf/
|
permalink: /doc/ptf/
|
||||||
---
|
---
|
||||||
|
|
||||||
|
**General Remainder:**
|
||||||
|
|
||||||
|
- The installation scripts and provided tools may have bugs, be vulnerable to Man in the Middle (MitM) attacks or other vulnerabilities.
|
||||||
|
|
||||||
|
- Adding additional repositories or tools for installing software extends your trust to those tool provider.
|
||||||
|
|
||||||
|
Please keep in mind that using such a VM or VM's based on the template for security and privacy critical tasks is not recommended.
|
||||||
|
|
||||||
How to create Penetration Testers Framework (PTF) VM
|
How to create Penetration Testers Framework (PTF) VM
|
||||||
====================================================
|
====================================================
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user