舉報

會員
目錄(145章)
倒序
- 封面
- 版權頁
- Credits
- Disclaimer
- About the Authors
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Beginning with Kali Linux
- A brief history of Kali Linux
- Kali Linux tool categories
- Downloading Kali Linux
- Using Kali Linux
- Configuring the virtual machine
- Updating Kali Linux
- Network services in Kali Linux
- Installing a vulnerable server
- Installing additional weapons
- Summary
- Chapter 2. Penetration Testing Methodology
- Types of penetration testing
- Vulnerability assessment versus penetration testing
- Security testing methodologies
- General penetration testing framework
- Information gathering
- The ethics
- Summary
- Chapter 3. Target Scoping
- Gathering client requirements
- Preparing the test plan
- Profiling test boundaries
- Defining business objectives
- Project management and scheduling
- Summary
- Chapter 4. Information Gathering
- Open Source Intelligence
- Using public resources
- Querying the domain registration information
- Analyzing the DNS records
- Getting network routing information
- Utilizing the search engine
- Metagoofil
- Accessing leaked information
- Summary
- Chapter 5. Target Discovery
- Starting off with target discovery
- Identifying the target machine
- OS fingerprinting
- Summary
- Chapter 6. Enumerating Target
- Introducing port scanning
- Understanding the TCP/IP protocol
- Understanding the TCP and UDP message format
- The network scanner
- Unicornscan
- Zenmap
- Amap
- SMB enumeration
- SNMP enumeration
- VPN enumeration
- Summary
- Chapter 7. Vulnerability Mapping
- Types of vulnerabilities
- Vulnerability taxonomy
- Automated vulnerability scanning
- Network vulnerability scanning
- Web application analysis
- Fuzz analysis
- Database assessment tools
- Summary
- Chapter 8. Social Engineering
- Modeling the human psychology
- Attack process
- Attack methods
- Social Engineering Toolkit
- Summary
- Chapter 9. Target Exploitation
- Vulnerability research
- Vulnerability and exploit repositories
- Advanced exploitation toolkit
- MSFConsole
- MSFCLI
- Ninja 101 drills
- Writing exploit modules
- Summary
- Chapter 10. Privilege Escalation
- Privilege escalation using a local exploit
- Password attack tools
- Network spoofing tools
- Network sniffers
- Summary
- Chapter 11. Maintaining Access
- Using operating system backdoors
- Working with tunneling tools
- Creating web backdoors
- Summary
- Chapter 12. Wireless Penetration Testing
- Wireless networking
- Wireless network recon
- Wireless testing tools
- Post cracking
- Sniffing wireless traffic
- Summary
- Chapter 13. Kali Nethunter
- Kali Nethunter
- Installing Kali Nethunter
- Nethunter icons
- Nethunter tools
- Third-party applications
- Wireless attacks
- HID attacks
- Summary
- Chapter 14. Documentation and Reporting
- Documentation and results verification
- Types of reports
- The executive report
- The management report
- The technical report
- Network penetration testing report (sample contents)
- Preparing your presentation
- Post-testing procedures
- Summary
- Appendix A. Supplementary Tools
- Reconnaissance tool
- Web application tools
- Network tool
- Summary
- Appendix B. Key Resources
- Vulnerability disclosure and tracking
- Paid incentive programs
- Reverse engineering resources
- Penetration testing learning resources
- Exploit development learning resources
- Penetration testing on a vulnerable environment
- Online web application challenges
- Virtual machines and ISO images
- Network ports
- Index 更新時間:2021-08-20 10:29:06
推薦閱讀
- MATLAB應用與實驗教程
- Python數據分析(第2版)
- 手把手教你學C語言
- iOS編程基礎:Swift、Xcode和Cocoa入門指南
- Java系統化項目開發教程
- Visual Basic程序設計
- SQL Server數據庫管理與開發兵書
- 小程序,巧應用:微信小程序開發實戰(第2版)
- iPhone應用開發從入門到精通
- 運維前線:一線運維專家的運維方法、技巧與實踐
- 創意UI:Photoshop玩轉APP設計
- STM8實戰
- 奔跑吧 Linux內核
- Google Adsense優化實戰
- 軟件測試技術
- Processing開發實戰
- MySQL核心技術與最佳實踐
- 移動智能系統測試原理與實踐
- 匯編語言程序設計教程
- Java入門經典
- 新手學Visual C
- 移動應用界面設計
- Java并發編程的藝術
- 軟件開發踐行錄:ThoughtWorks中國區文集
- HTML5+CSS3+JavaScript從入門到精通(微課精編版)
- Python數據分析實戰
- Google API大全
- 深入學習Java開發簡單應用(藍橋杯軟件大賽培訓教材-Java方向)
- 量化金融R語言初級教程
- Python程序設計