- Kali Linux Network Scanning Cookbook
- Justin Hutchens
- 199字
- 2021-09-03 09:57:59
What this book covers
Chapter 1, Getting Started, introduces the underlying principles and concepts that will be used throughout the remainder of the book.
Chapter 2, Discovery Scanning, covers techniques and scanning tools that can be used to identify live systems on a target network, by performing layer 2, layer 3, and layer 4 discovery.
Chapter 3, Port Scanning, includes techniques and scanning tools that can be used to enumerate running UDP and TCP services on a target system.
Chapter 4, Fingerprinting, explains techniques and scanning tools that can be used to identify the operating system and services running on a target system.
Chapter 5, Vulnerability Scanning, covers techniques and scanning tools that can be used to identify and enumerate potential vulnerabilities on a target system.
Chapter 6, Denial of Service, introduces techniques and attack tools that can be used to exploit denial of service vulnerabilities identified on a target system.
Chapter 7, Web Application Scanning, provides techniques and tools that can be used to identify and exploit web application vulnerabilities on a target system.
Chapter 8, Automating Kali Tools, introduces scripting techniques that can be used to streamline and automate the use of existing tools in Kali Linux.
- 科技安全:戰略實踐與展望
- Learning Veeam? Backup & Replication for VMware vSphere
- Kali Linux Network Scanning Cookbook(Second Edition)
- 移動APT:威脅情報分析與數據防護
- CTF那些事兒
- 人工智能安全(精裝版)
- 網絡關鍵設備安全檢測實施指南
- 實用黑客攻防技術
- CTF特訓營:技術詳解、解題方法與競賽技巧
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- 黑客攻擊與防范實戰從入門到精通
- 網絡空間安全法律問題研究
- 聯邦學習原理與算法
- Web代碼安全漏洞深度剖析
- Blockchain Development with Hyperledger