官术网_书友最值得收藏!

Preface

This book begins with the installation and configuration of Kali Linux to help you perform your tests. You will then learn about methods that will help you gather intel and perform web application exploitation using tools such as Burp. Moving forward, you will also learn how to perform network exploitation by generating payloads using MSFPC, Metasploit, and Cobalt Strike. Next, you will learn about monitoring and cracking wireless networks using Aircrack, Fluxion, and Wifi-Pumpkin. After that, you will learn how to analyze, generate, and crack passwords using tools such as Patator, John the Ripper, and ceWL. Later, you will also learn about some of the tools that help in forensic investigations. Lastly, you will learn how to create an optimum quality pentest report!

By the end of this book, you will know how to conduct advanced and efficient penetration testing activities thanks to the book's crisp and task-oriented recipes.

主站蜘蛛池模板: 乐山市| 彩票| 玛纳斯县| 全州县| 河间市| 依安县| 睢宁县| 孝昌县| 襄城县| 和政县| 喀什市| 青铜峡市| 环江| 股票| 青铜峡市| 瓮安县| 通江县| 孝感市| 溧水县| 平顶山市| 东至县| 壶关县| 康定县| 永安市| 顺平县| 思茅市| 博野县| 广东省| 铁岭县| 西畴县| 望奎县| 康定县| 天峻县| 屯昌县| 阿合奇县| 固镇县| 望谟县| 疏勒县| 宣化县| 舞钢市| 长寿区|