官术网_书友最值得收藏!

What this book covers

Chapter 1, Getting Started, introduces the underlying principles and concepts that will be used throughout the remainder of the book.

Chapter 2, Discovery Scanning, covers techniques and scanning tools that can be used to identify live systems on a target network, by performing layer 2, layer 3, and layer 4 discovery.

Chapter 3, Port Scanning, includes techniques and scanning tools that can be used to enumerate running UDP and TCP services on a target system.

Chapter 4, Fingerprinting, explains techniques and scanning tools that can be used to identify the operating system and services running on a target system.

Chapter 5, Vulnerability Scanning, covers techniques and scanning tools that can be used to identify and enumerate potential vulnerabilities on a target system.

Chapter 6, Denial of Service, introduces techniques and attack tools that can be used to exploit denial of service vulnerabilities identified on a target system.

Chapter 7, Web Application Scanning, provides techniques and tools that can be used to identify and exploit web application vulnerabilities on a target system.

Chapter 8, Automating Kali Tools, introduces scripting techniques that can be used to streamline and automate the use of existing tools in Kali Linux.

主站蜘蛛池模板: 禄丰县| 土默特左旗| 罗甸县| 浦城县| 扬中市| 巨鹿县| 旅游| 遂宁市| 隆回县| 涿州市| 清远市| 天峨县| 吴江市| 合阳县| 万源市| 都江堰市| 桃源县| 伊吾县| 巴中市| 左云县| 平乐县| 延津县| 澜沧| 溆浦县| 林甸县| 尤溪县| 太仆寺旗| 呈贡县| 博湖县| 乌兰县| 阳曲县| 兖州市| 丹江口市| 观塘区| 大石桥市| 福州市| 龙州县| 双流县| 炉霍县| 余庆县| 庄河市|