Kali.Linux.Pentesting.Cookbook
Key Features Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, wireshark, nmap and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task oriented recipes. Book Description With the current rate of hacking, it is very important to pentest your environment in order to ensure advance level security. This book will be packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) as per your requirements and move on to core functionalities. This book will start with the installation and configuration of Kali Linux to perform your tests. You will learn how to plan attack strategies and perform web application exploitation using Burp, XSSer, Jboss-autopwn, and so on. You will also learn how to perform network exploitation using Hamster, Sparta and Wireshark. Next, you will perform wireless and password attacks by using tools such as Patator, John the Ripper and cew. Moving on you will cover malware analysis and Forensis along with hardware hacking. Lastly you will learn how to create an optimum quality pentest report! By the end of this book, you will learn how to conduct advanced penetration testing in the form of crisp and task oriented recipes. What you will learn Install and setup Kali Linux on multiple platforms Customize Kali Linux to your individual needs Exploit vulnerabilities you've found with Metasploit Carry out web application and network exploitation Perform wireless and password attacks Decode messages from the Radio Learn how to write your pentest report Table of Contents Chapter 1. Kali – An Introduction Chapter 2. Gathering Intel And Planning Attack Strategies Chapter 3. Vulnerability Assessment Chapter 4. Web App Exploitation – Beyond Owasp Top 10 Chapter 5. Network Exploitation On Current Exploitation Chapter 6. Wireless Attacks – Getting Past Aircrack-Ng Chapter 7. Password Attacks – The Fault In Their Stars Chapter 8. Have Shell Now What? Chapter 9. Buffer Overflows Chapter 10. Playing With Software-Defined Radios Chapter 11. Kali In Your Pocket – Nethunters And Raspberries Chapter 12. Writing Reports
- 粉丝: 354
- 资源: 1489
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- Unity WebGL(IIS)配置pdf文档
- 三菱PLC例程源码电机高低速变换
- 【matlab / python / tkinter / BasicSR】基于EDVR SRCNN FSRCNN 的超分辨率部署
- 3400-CMN3400-VB一款N-Channel沟道SOT23的MOSFET晶体管参数介绍与应用说明
- 336P-VB一款SOT23封装P-Channel场效应MOS管
- untitled0 - 副本.py
- 基于python+opencv开发的图片批量去黑边+裁剪+压缩工具源码+开发文档+实用教程(期末大作业&课设&项目开发)
- 三菱PLC例程源码电镀线程序
- 从PDF文件中读取表格内容并写入到EXCEL文档的pyton小程序
- 3365-VB一款P-Channel沟道SOT23的MOSFET晶体管参数介绍与应用说明