官术网_书友最值得收藏!

What this book covers

Chapter 1, Introduction to Kali NetHunter, introduces Kali NetHunter and describes some of the tools within its mobile platform. You'll learn about the Android platform and its security model, and finally you'll learn how to install the Kali NetHunter platform on an Android device.

Chapter 2, Understanding the Phases of the Pentesting Process, covers the importance and need for penetration testing in the digital world. You'll learn about the different types of threat actors and cyber security teams within an organization. Furthermore, you'll learn the basics of penetration testing by learning about the phases and various frameworks.

Chapter 3, Intelligence Gathering Tools, explores the various methods and resources a penetration tester can use to obtain information about a target.

Chapter 4, Scanning and Enumeration Tools, covers an overview of scanning and enumeration. You'll learn about various scanning techniques and tools in order to better profile a target. Additionally, using numerous techniques and tools, you'll be able to extraction information from the target using the process of enumeration.

Chapter 5, Penetrating the Target, covers some top tips for successfully exploiting a system and gaining access. By the end of this chapter, you'll be able to use various techniques to gain access to a target.

Chapter 6, Clearing Tracks and Removing Evidence from a Target, covers the importance of clearing your tracks as a penetration tester. You'll learn about various types of logs and their locations, a number of utilities and tools to assist in clearing log data, and removing files from both Windows and Linux systems.

Chapter 7, Packet Sniffing and Traffic Analysis, explores various packet sniffing techniques, tools, and devices. At the end of the chapter, you will be able to perform packet sniffing using a number of native tools within Kali NetHunter. Additionally, you'll learn how to analyze data using some very well-known tools.

Chapter 8, Targeting Wireless Devices and Networks, covers the types of wireless networks, standards, and topologies. You'll learn about a wide array of threats and attacks that occur on wireless networks and will be able to perform these attacks yourself.

Chapter 9, Avoiding Detection, covers the fundamentals a penetration tester needs to know and understand in order to be stealthy using various techniques during a penetration test.

Chapter 10, Hardening Techniques and Countermeasures, covers commonly-found threats in the digital world and explains how to secure network appliances, client and server operating systems, and mobile devices.

Chapter 11, Building a Lab, covers the requirements and process of setting up a personal penetration testing lab environment, as well as how to assemble it.

Chapter 12, Selecting A Kali Device and Hardware, helps you choose a suitable device for Kali NetHunter.

主站蜘蛛池模板: 黔东| 遂川县| 电白县| 梁河县| 湖北省| 安陆市| 灵璧县| 牙克石市| 上栗县| 彭水| 含山县| 库车县| 东兴市| 柳江县| 竹山县| 涟水县| 富锦市| 遂川县| 登封市| 潞西市| 榆社县| 唐海县| 东乡县| 陆良县| 台北市| 和田县| 盐边县| 莒南县| 伊春市| 崇仁县| 象山县| 洪雅县| 扶绥县| 马鞍山市| 铁力市| 冀州市| 盐亭县| 淮北市| 江华| 西充县| 商都县|