Search Results - "Google search"
Suggested Topics within your search.
Suggested Topics within your search.
-
1
Hacking with kali practical penetration testing techniques
Published 2014Table of Contents: “…ch. 1 Introduction -- Book Overview and Key Learning Points -- Book Audience -- Diagrams, Figures, and Screen Captures -- Welcome -- Penetration Testing Lifecycle -- Terms -- Kali History -- References -- ch. 2 Download and Install Kali Linux -- Chapter Overview and Key Learning Points -- Kali Linux -- System Information -- Downloading Kali -- Hard Drive Installation -- Thumb Drive Installation -- SD Card Installation -- Summary -- ch. 3 Software, Patches, and Upgrades -- Chapter Overview and Key Learning Points -- APT Package Handling Utility -- Debian Package Manager -- Tarballs -- A Practical Guide to Installing Nessus -- Conclusion -- ch. 4 Configuring Kali Linux -- Chapter Overview and Key Learning Points -- About This Chapter -- The Basics of Networking -- Using the Graphical User Interface to Configure Network Interfaces -- Using the Command Line to Configure Network Interfaces -- Using the GUI to Configure Wireless Cards -- Web Server -- FTP Server -- SSH Server -- Configure and Access External Media -- Updating Kali -- Upgrading Kali -- Adding a Repository Source -- Summary -- ch. 5 Building a Penetration Testing Lab -- Chapter Overview and Key Learning Points -- Before Reading This Chapter: Build a Lab -- Building a Lab on a Dime -- Metasploitable2 -- Extending Your Lab -- The Magical Code Injection Rainbow -- ch. 6 Introduction to the Penetration Test Lifecycle -- Chapter Overview and Key Learning Points -- Introduction to the Lifecycle -- Phase 1 Reconnaissance -- Phase 2 Scanning -- Phase 3 Exploitation -- Phase 4 Maintaining Access -- Phase 5 Reporting -- Summary -- ch. 7 Reconnaissance -- Chapter Overview and Key Learning Points -- Introduction -- Start with the Targets Own Website -- Website Mirroring -- Google Searches -- Google Hacking -- Social Media -- Job Sites -- DNS and DNS Attacks -- Query a Name Server -- Zone Transfer -- Reference -- ch. 8 Scanning -- Chapter Overview and Key Learning Points -- Introduction to Scanning -- Understanding Network Traffic -- NMAP the King of Scanners -- Selecting Ports -- HPING3 -- Nessus -- Summary -- ch. 9 Exploitation -- Chapter Overview and Key Learning Points -- Introduction -- An Overview of Metasploit -- Accessing Metasploit -- Web Server and Web Application Exploitation -- Conclusion -- ch. 10 Maintaining Access -- Chapter Overview and Key Learning Points -- Introduction -- Terminology and Core Concepts -- Backdoors -- Keyloggers -- Summary -- Reference -- ch. 11 Reports and Templates -- Chapter Overview and Key Learning Points -- Reporting -- Presentation -- Report and Evidence Storage -- Summary.…”
Book


