最新章節
- Index
- Network ports
- Virtual machines and ISO images
- Online web application challenges
- Penetration testing on a vulnerable environment
- Exploit development learning resources
品牌:中圖公司
上架時間:2021-08-20 09:50:03
出版社:Packt Publishing
本書數字版權由中圖公司提供,并由其授權上海閱文信息技術有限公司制作發行
- Index 更新時間:2021-08-20 10:29:06
- Network ports
- Virtual machines and ISO images
- Online web application challenges
- Penetration testing on a vulnerable environment
- Exploit development learning resources
- Penetration testing learning resources
- Reverse engineering resources
- Paid incentive programs
- Vulnerability disclosure and tracking
- Appendix B. Key Resources
- Summary
- Network tool
- Web application tools
- Reconnaissance tool
- Appendix A. Supplementary Tools
- Summary
- Post-testing procedures
- Preparing your presentation
- Network penetration testing report (sample contents)
- The technical report
- The management report
- The executive report
- Types of reports
- Documentation and results verification
- Chapter 14. Documentation and Reporting
- Summary
- HID attacks
- Wireless attacks
- Third-party applications
- Nethunter tools
- Nethunter icons
- Installing Kali Nethunter
- Kali Nethunter
- Chapter 13. Kali Nethunter
- Summary
- Sniffing wireless traffic
- Post cracking
- Wireless testing tools
- Wireless network recon
- Wireless networking
- Chapter 12. Wireless Penetration Testing
- Summary
- Creating web backdoors
- Working with tunneling tools
- Using operating system backdoors
- Chapter 11. Maintaining Access
- Summary
- Network sniffers
- Network spoofing tools
- Password attack tools
- Privilege escalation using a local exploit
- Chapter 10. Privilege Escalation
- Summary
- Writing exploit modules
- Ninja 101 drills
- MSFCLI
- MSFConsole
- Advanced exploitation toolkit
- Vulnerability and exploit repositories
- Vulnerability research
- Chapter 9. Target Exploitation
- Summary
- Social Engineering Toolkit
- Attack methods
- Attack process
- Modeling the human psychology
- Chapter 8. Social Engineering
- Summary
- Database assessment tools
- Fuzz analysis
- Web application analysis
- Network vulnerability scanning
- Automated vulnerability scanning
- Vulnerability taxonomy
- Types of vulnerabilities
- Chapter 7. Vulnerability Mapping
- Summary
- VPN enumeration
- SNMP enumeration
- SMB enumeration
- Amap
- Zenmap
- Unicornscan
- The network scanner
- Understanding the TCP and UDP message format
- Understanding the TCP/IP protocol
- Introducing port scanning
- Chapter 6. Enumerating Target
- Summary
- OS fingerprinting
- Identifying the target machine
- Starting off with target discovery
- Chapter 5. Target Discovery
- Summary
- Accessing leaked information
- Metagoofil
- Utilizing the search engine
- Getting network routing information
- Analyzing the DNS records
- Querying the domain registration information
- Using public resources
- Open Source Intelligence
- Chapter 4. Information Gathering
- Summary
- Project management and scheduling
- Defining business objectives
- Profiling test boundaries
- Preparing the test plan
- Gathering client requirements
- Chapter 3. Target Scoping
- Summary
- The ethics
- Information gathering
- General penetration testing framework
- Security testing methodologies
- Vulnerability assessment versus penetration testing
- Types of penetration testing
- Chapter 2. Penetration Testing Methodology
- Summary
- Installing additional weapons
- Installing a vulnerable server
- Network services in Kali Linux
- Updating Kali Linux
- Configuring the virtual machine
- Using Kali Linux
- Downloading Kali Linux
- Kali Linux tool categories
- A brief history of Kali Linux
- Chapter 1. Beginning with Kali Linux
- Customer support
- Reader feedback
- Conventions
- Who this book is for
- What you need for this book
- What this book covers
- Preface
- eBooks discount offers and more
- www.PacktPub.com
- About the Reviewer
- About the Authors
- Disclaimer
- Credits
- 版權頁
- 封面
- 封面
- 版權頁
- Credits
- Disclaimer
- About the Authors
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Beginning with Kali Linux
- A brief history of Kali Linux
- Kali Linux tool categories
- Downloading Kali Linux
- Using Kali Linux
- Configuring the virtual machine
- Updating Kali Linux
- Network services in Kali Linux
- Installing a vulnerable server
- Installing additional weapons
- Summary
- Chapter 2. Penetration Testing Methodology
- Types of penetration testing
- Vulnerability assessment versus penetration testing
- Security testing methodologies
- General penetration testing framework
- Information gathering
- The ethics
- Summary
- Chapter 3. Target Scoping
- Gathering client requirements
- Preparing the test plan
- Profiling test boundaries
- Defining business objectives
- Project management and scheduling
- Summary
- Chapter 4. Information Gathering
- Open Source Intelligence
- Using public resources
- Querying the domain registration information
- Analyzing the DNS records
- Getting network routing information
- Utilizing the search engine
- Metagoofil
- Accessing leaked information
- Summary
- Chapter 5. Target Discovery
- Starting off with target discovery
- Identifying the target machine
- OS fingerprinting
- Summary
- Chapter 6. Enumerating Target
- Introducing port scanning
- Understanding the TCP/IP protocol
- Understanding the TCP and UDP message format
- The network scanner
- Unicornscan
- Zenmap
- Amap
- SMB enumeration
- SNMP enumeration
- VPN enumeration
- Summary
- Chapter 7. Vulnerability Mapping
- Types of vulnerabilities
- Vulnerability taxonomy
- Automated vulnerability scanning
- Network vulnerability scanning
- Web application analysis
- Fuzz analysis
- Database assessment tools
- Summary
- Chapter 8. Social Engineering
- Modeling the human psychology
- Attack process
- Attack methods
- Social Engineering Toolkit
- Summary
- Chapter 9. Target Exploitation
- Vulnerability research
- Vulnerability and exploit repositories
- Advanced exploitation toolkit
- MSFConsole
- MSFCLI
- Ninja 101 drills
- Writing exploit modules
- Summary
- Chapter 10. Privilege Escalation
- Privilege escalation using a local exploit
- Password attack tools
- Network spoofing tools
- Network sniffers
- Summary
- Chapter 11. Maintaining Access
- Using operating system backdoors
- Working with tunneling tools
- Creating web backdoors
- Summary
- Chapter 12. Wireless Penetration Testing
- Wireless networking
- Wireless network recon
- Wireless testing tools
- Post cracking
- Sniffing wireless traffic
- Summary
- Chapter 13. Kali Nethunter
- Kali Nethunter
- Installing Kali Nethunter
- Nethunter icons
- Nethunter tools
- Third-party applications
- Wireless attacks
- HID attacks
- Summary
- Chapter 14. Documentation and Reporting
- Documentation and results verification
- Types of reports
- The executive report
- The management report
- The technical report
- Network penetration testing report (sample contents)
- Preparing your presentation
- Post-testing procedures
- Summary
- Appendix A. Supplementary Tools
- Reconnaissance tool
- Web application tools
- Network tool
- Summary
- Appendix B. Key Resources
- Vulnerability disclosure and tracking
- Paid incentive programs
- Reverse engineering resources
- Penetration testing learning resources
- Exploit development learning resources
- Penetration testing on a vulnerable environment
- Online web application challenges
- Virtual machines and ISO images
- Network ports
- Index 更新時間:2021-08-20 10:29:06