舉報

會員
目錄(145章)
倒序
- 封面
- 版權頁
- Credits
- Disclaimer
- About the Authors
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Beginning with Kali Linux
- A brief history of Kali Linux
- Kali Linux tool categories
- Downloading Kali Linux
- Using Kali Linux
- Configuring the virtual machine
- Updating Kali Linux
- Network services in Kali Linux
- Installing a vulnerable server
- Installing additional weapons
- Summary
- Chapter 2. Penetration Testing Methodology
- Types of penetration testing
- Vulnerability assessment versus penetration testing
- Security testing methodologies
- General penetration testing framework
- Information gathering
- The ethics
- Summary
- Chapter 3. Target Scoping
- Gathering client requirements
- Preparing the test plan
- Profiling test boundaries
- Defining business objectives
- Project management and scheduling
- Summary
- Chapter 4. Information Gathering
- Open Source Intelligence
- Using public resources
- Querying the domain registration information
- Analyzing the DNS records
- Getting network routing information
- Utilizing the search engine
- Metagoofil
- Accessing leaked information
- Summary
- Chapter 5. Target Discovery
- Starting off with target discovery
- Identifying the target machine
- OS fingerprinting
- Summary
- Chapter 6. Enumerating Target
- Introducing port scanning
- Understanding the TCP/IP protocol
- Understanding the TCP and UDP message format
- The network scanner
- Unicornscan
- Zenmap
- Amap
- SMB enumeration
- SNMP enumeration
- VPN enumeration
- Summary
- Chapter 7. Vulnerability Mapping
- Types of vulnerabilities
- Vulnerability taxonomy
- Automated vulnerability scanning
- Network vulnerability scanning
- Web application analysis
- Fuzz analysis
- Database assessment tools
- Summary
- Chapter 8. Social Engineering
- Modeling the human psychology
- Attack process
- Attack methods
- Social Engineering Toolkit
- Summary
- Chapter 9. Target Exploitation
- Vulnerability research
- Vulnerability and exploit repositories
- Advanced exploitation toolkit
- MSFConsole
- MSFCLI
- Ninja 101 drills
- Writing exploit modules
- Summary
- Chapter 10. Privilege Escalation
- Privilege escalation using a local exploit
- Password attack tools
- Network spoofing tools
- Network sniffers
- Summary
- Chapter 11. Maintaining Access
- Using operating system backdoors
- Working with tunneling tools
- Creating web backdoors
- Summary
- Chapter 12. Wireless Penetration Testing
- Wireless networking
- Wireless network recon
- Wireless testing tools
- Post cracking
- Sniffing wireless traffic
- Summary
- Chapter 13. Kali Nethunter
- Kali Nethunter
- Installing Kali Nethunter
- Nethunter icons
- Nethunter tools
- Third-party applications
- Wireless attacks
- HID attacks
- Summary
- Chapter 14. Documentation and Reporting
- Documentation and results verification
- Types of reports
- The executive report
- The management report
- The technical report
- Network penetration testing report (sample contents)
- Preparing your presentation
- Post-testing procedures
- Summary
- Appendix A. Supplementary Tools
- Reconnaissance tool
- Web application tools
- Network tool
- Summary
- Appendix B. Key Resources
- Vulnerability disclosure and tracking
- Paid incentive programs
- Reverse engineering resources
- Penetration testing learning resources
- Exploit development learning resources
- Penetration testing on a vulnerable environment
- Online web application challenges
- Virtual machines and ISO images
- Network ports
- Index 更新時間:2021-08-20 10:29:06
推薦閱讀
- 基于Java技術的Web應用開發
- Python機器學習編程與實戰
- Learning DHTMLX Suite UI
- 精通MATLAB(第3版)
- Vue.js 2 Web Development Projects
- Instant PHP Web Scraping
- JSP程序設計實例教程(第2版)
- Beginning C++ Game Programming
- QGIS 2 Cookbook
- Building Dynamics CRM 2015 Dashboards with Power BI
- Struts 2.x權威指南
- Instant AppFog
- Getting Started with Backbone Marionette
- Scratch 3.0少兒積木式編程(6~10歲)
- R統計應用開發實戰
- Developing RESTful Web Services with Jersey 2.0
- Access 2010數據庫教程(微課版)
- C語言從入門到精通(第4版)
- ReactJS Blueprints
- Learn iOS 11 Programming with Swift 4(Second Edition)
- Flink大數據分析實戰
- Angular Router
- Access 2010數據庫基礎教程
- Julia語言程序設計
- Raspberry Pi for Secret Agents(Second Edition)
- Deploying Microsoft System Center Configuration Manager
- 面向對象是怎樣工作的(第3版)
- Electron Projects
- Java學習手冊
- PHP 7從入門到精通(視頻教學版)(第2版)