首頁(yè) > 計(jì)算機(jī)網(wǎng)絡(luò) >
編程語(yǔ)言與程序設(shè)計(jì)
> Kali Linux 2:Assuring Security by Penetration Testing(Third Edition)最新章節(jié)目錄
舉報(bào)

會(huì)員
Kali Linux 2:Assuring Security by Penetration Testing(Third Edition)
最新章節(jié):
Index
IfyouareanITsecurityprofessionalorastudentwithbasicknowledgeofUnix/Linuxoperatingsystems,includinganawarenessofinformationsecurityfactors,andyouwanttouseKaliLinuxforpenetrationtesting,thisbookisforyou.
目錄(145章)
倒序
- 封面
- 版權(quán)頁(yè)
- Credits
- Disclaimer
- About the Authors
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Beginning with Kali Linux
- A brief history of Kali Linux
- Kali Linux tool categories
- Downloading Kali Linux
- Using Kali Linux
- Configuring the virtual machine
- Updating Kali Linux
- Network services in Kali Linux
- Installing a vulnerable server
- Installing additional weapons
- Summary
- Chapter 2. Penetration Testing Methodology
- Types of penetration testing
- Vulnerability assessment versus penetration testing
- Security testing methodologies
- General penetration testing framework
- Information gathering
- The ethics
- Summary
- Chapter 3. Target Scoping
- Gathering client requirements
- Preparing the test plan
- Profiling test boundaries
- Defining business objectives
- Project management and scheduling
- Summary
- Chapter 4. Information Gathering
- Open Source Intelligence
- Using public resources
- Querying the domain registration information
- Analyzing the DNS records
- Getting network routing information
- Utilizing the search engine
- Metagoofil
- Accessing leaked information
- Summary
- Chapter 5. Target Discovery
- Starting off with target discovery
- Identifying the target machine
- OS fingerprinting
- Summary
- Chapter 6. Enumerating Target
- Introducing port scanning
- Understanding the TCP/IP protocol
- Understanding the TCP and UDP message format
- The network scanner
- Unicornscan
- Zenmap
- Amap
- SMB enumeration
- SNMP enumeration
- VPN enumeration
- Summary
- Chapter 7. Vulnerability Mapping
- Types of vulnerabilities
- Vulnerability taxonomy
- Automated vulnerability scanning
- Network vulnerability scanning
- Web application analysis
- Fuzz analysis
- Database assessment tools
- Summary
- Chapter 8. Social Engineering
- Modeling the human psychology
- Attack process
- Attack methods
- Social Engineering Toolkit
- Summary
- Chapter 9. Target Exploitation
- Vulnerability research
- Vulnerability and exploit repositories
- Advanced exploitation toolkit
- MSFConsole
- MSFCLI
- Ninja 101 drills
- Writing exploit modules
- Summary
- Chapter 10. Privilege Escalation
- Privilege escalation using a local exploit
- Password attack tools
- Network spoofing tools
- Network sniffers
- Summary
- Chapter 11. Maintaining Access
- Using operating system backdoors
- Working with tunneling tools
- Creating web backdoors
- Summary
- Chapter 12. Wireless Penetration Testing
- Wireless networking
- Wireless network recon
- Wireless testing tools
- Post cracking
- Sniffing wireless traffic
- Summary
- Chapter 13. Kali Nethunter
- Kali Nethunter
- Installing Kali Nethunter
- Nethunter icons
- Nethunter tools
- Third-party applications
- Wireless attacks
- HID attacks
- Summary
- Chapter 14. Documentation and Reporting
- Documentation and results verification
- Types of reports
- The executive report
- The management report
- The technical report
- Network penetration testing report (sample contents)
- Preparing your presentation
- Post-testing procedures
- Summary
- Appendix A. Supplementary Tools
- Reconnaissance tool
- Web application tools
- Network tool
- Summary
- Appendix B. Key Resources
- Vulnerability disclosure and tracking
- Paid incentive programs
- Reverse engineering resources
- Penetration testing learning resources
- Exploit development learning resources
- Penetration testing on a vulnerable environment
- Online web application challenges
- Virtual machines and ISO images
- Network ports
- Index 更新時(shí)間:2021-08-20 10:29:06
推薦閱讀
- 演進(jìn)式架構(gòu)(原書(shū)第2版)
- Spring技術(shù)內(nèi)幕:深入解析Spring架構(gòu)與設(shè)計(jì)
- Java開(kāi)發(fā)入行真功夫
- Blender 3D Incredible Machines
- Expert Data Visualization
- 深入分布式緩存:從原理到實(shí)踐
- Unity UI Cookbook
- Android系統(tǒng)原理及開(kāi)發(fā)要點(diǎn)詳解
- Python3.5從零開(kāi)始學(xué)
- Python Digital Forensics Cookbook
- Java并發(fā)實(shí)現(xiàn)原理:JDK源碼剖析
- MongoDB Cookbook
- Instant Pygame for Python Game Development How-to
- Mastering Machine Learning with scikit-learn
- Java程序性能優(yōu)化實(shí)戰(zhàn)
- Neo4j權(quán)威指南 (圖數(shù)據(jù)庫(kù)技術(shù)叢書(shū))
- R High Performance Programming
- Java EE應(yīng)用開(kāi)發(fā)及實(shí)訓(xùn)
- Nginx Troubleshooting
- 競(jìng)技游戲設(shè)計(jì)實(shí)戰(zhàn)指南:MOBA+RTS+TCG+FPS
- Procedural Content Generation for Unity Game Development
- Java 8實(shí)戰(zhàn)
- jQuery EasyUI開(kāi)發(fā)指南
- 零基礎(chǔ)學(xué)Python(第2版)
- Swift iOS應(yīng)用開(kāi)發(fā)實(shí)戰(zhàn)
- 產(chǎn)品經(jīng)理實(shí)用手冊(cè):Axure RP原型設(shè)計(jì)實(shí)踐(Web+App)
- PHP和MySQL Web應(yīng)用開(kāi)發(fā)
- Swift 3 Functional Programming
- 深入理解React Router:從原理到實(shí)踐
- 機(jī)器學(xué)習(xí)與深度學(xué)習(xí)(Python版·微課視頻版)