{"id":587,"date":"2010-06-26T11:19:34","date_gmt":"2010-06-26T08:19:34","guid":{"rendered":"http:\/\/www.binaryvision.org.il\/?p=587"},"modified":"2011-09-23T17:56:12","modified_gmt":"2011-09-23T14:56:12","slug":"%d7%90%d7%aa%d7%92%d7%a8-hacking-%d7%a9%d7%9c-offensive-security-%d7%a9%d7%9c%d7%91-%d7%a8%d7%90%d7%a9%d7%95%d7%9f","status":"publish","type":"post","link":"https:\/\/www.binaryvision.co.il\/2010\/06\/%d7%90%d7%aa%d7%92%d7%a8-hacking-%d7%a9%d7%9c-offensive-security-%d7%a9%d7%9c%d7%91-%d7%a8%d7%90%d7%a9%d7%95%d7%9f\/","title":{"rendered":"\u05d0\u05ea\u05d2\u05e8 Hacking \u05e9\u05dc Offensive Security – \u05e9\u05dc\u05d1 \u05e8\u05d0\u05e9\u05d5\u05df"},"content":{"rendered":"

\u05e7\u05e6\u05ea \u05e2\u05dc \u05d4\u05d0\u05ea\u05d2\u05e8<\/h2>\n

\u05d4\u05d0\u05ea\u05d2\u05e8 \u05d4\u05ea\u05d7\u05d9\u05dc \u05d119 \u05dc\u05d9\u05d5\u05e0\u05d9 \u05d1\u05e9\u05d1\u05ea, \u05d5\u05e0\u05de\u05e9\u05da 48 \u05e9\u05e2\u05d5\u05ea.
\n\u05d4\u05de\u05d0\u05e8\u05d2\u05e0\u05d9\u05dd \u05e9\u05dc \u05d4\u05d0\u05ea\u05d2\u05e8 \u05d4\u05e7\u05d9\u05de\u05d5 5 \u05de\u05db\u05d5\u05e0\u05d5\u05ea \u05d5\u05d9\u05e8\u05d8\u05d5\u05d0\u05dc\u05d9\u05d5\u05ea (Virtual Machines) \u05e9\u05d9\u05d5\u05e9\u05d1\u05d5\u05ea \u05e2\u05dc \u05e9\u05e8\u05ea \u05d0\u05e6\u05dc\u05d4\u05dd.
\n\u05d5\u05dc\u05db\u05dc \u05de\u05d9 \u05e9\u05e0\u05e8\u05e9\u05dd \u05e0\u05ea\u05e0\u05d5 \u05e9\u05dd \u05de\u05e9\u05ea\u05de\u05e9 \u05d5\u05e1\u05d9\u05e1\u05de\u05d4 \u05d1\u05e9\u05d1\u05d9\u05dc \u05d2\u05d9\u05e9\u05ea VPN.
\n\u05d1\u05e8\u05d2\u05e2 \u05e9\u05de\u05ea\u05d7\u05d1\u05e8\u05d9\u05dd \u05de\u05e7\u05d1\u05dc\u05d9\u05dd \u05db\u05ea\u05d5\u05d1\u05ea IP \u05d1C Class \u05e9\u05e2\u05dc\u05d9\u05d5 \u05d9\u05d5\u05e9\u05d1\u05d9\u05dd \u05d4\u05e9\u05e8\u05ea\u05d9\u05dd.
\n\u05de\u05d8\u05e8\u05ea \u05d4\u05d0\u05ea\u05d2\u05e8:<\/p>\n