- Kali Linux Cookbook(Second Edition)
- Corey P. Schultz Bob Perciaccante
- 428字
- 2021-07-02 18:27:06
What this book covers
Chapter 1, Installing Kali and the Lab Setup, documents best practices for setting up a testing environment, where you can test the skills highlighted in this book.
Chapter 2, Reconnaissance and Scanning, enables you to learn the skills necessary to gather information about your target environment. We will gather domain names, IP subnets, hosts, routing information, as well as other useful information. You will also learn how to keep track of this data, so we can refer to it in the future as we progress through our penetration testing environment.
Chapter 3, Vulnerability Analysis, explains that once access to a network has been gained and the systems within that network have been identified, the next step is to establish a foothold and persistent access.
Chapter 4, Finding Exploits in the Target, takes the host information that we have accumulated to determine the potential exploits to use against target machines and services.
Chapter 5, Social Engineering, speaks about social engineering that can be employed through electronic means and is also used in physical penetration testing and even data gathering. We bend well-known natural tendencies to help us accomplish or obtain what we want.
Chapter 6, Password Cracking, enables you to learn different techniques and tools to gain knowledge of password hashes gained during various attacks, as well as the means to reset these passwords if access is gained.
Chapter 7, Privilege Escalation, helps you to learn how to use a small foothold to expand the scope of your breach, increase the admin level, and use lateral movement to compromise more machines. In most cases, the initial point of a breach is not the desired target, but just a means to get to the more valuable targets.
Chapter 8, Wireless Specific Recipes, explains that due to the ever growing adoption of wireless networking, as well as the extended reach wireless signals can provide, we will focus on how to gain access to these networks through a variety of means.
Chapter 9, Web and Database Specific Recipes, explains that evaluating the security of web applications and databases requires a unique set of tools that can be leveraged against them. In the event that a web application is compromised, it is highly likely that it may then be used as a jumping off point for further network penetration.
Chapter 10, Maintaining Access, explains that once access has been gained to the target environment, it is crucial to make sure that your access is maintained. Learn how to maintain access and pivot into other areas of your target environment.
- Data Visualization with D3 4.x Cookbook(Second Edition)
- Modular Programming with Python
- 零基礎學C++程序設計
- Access 2010數據庫基礎與應用項目式教程(第3版)
- 嚴密系統設計:方法、趨勢與挑戰
- Mastering Android Development with Kotlin
- Visual Basic程序設計教程
- 開源項目成功之道
- Cocos2d-x by Example:Beginner's Guide(Second Edition)
- Mastering Concurrency Programming with Java 9(Second Edition)
- Emotional Intelligence for IT Professionals
- Python Linux系統管理與自動化運維
- Sitecore Cookbook for Developers
- Google Adsense優化實戰
- iOS Development with Xamarin Cookbook