官术网_书友最值得收藏!

Preface

This book begins with the installation and configuration of Kali Linux to help you perform your tests. You will then learn about methods that will help you gather intel and perform web application exploitation using tools such as Burp. Moving forward, you will also learn how to perform network exploitation by generating payloads using MSFPC, Metasploit, and Cobalt Strike. Next, you will learn about monitoring and cracking wireless networks using Aircrack, Fluxion, and Wifi-Pumpkin. After that, you will learn how to analyze, generate, and crack passwords using tools such as Patator, John the Ripper, and ceWL. Later, you will also learn about some of the tools that help in forensic investigations. Lastly, you will learn how to create an optimum quality pentest report!

By the end of this book, you will know how to conduct advanced and efficient penetration testing activities thanks to the book's crisp and task-oriented recipes.

主站蜘蛛池模板: 乌什县| 东方市| 杭锦后旗| 磴口县| 瑞丽市| 昌江| 遂平县| 金寨县| 璧山县| 新竹县| 图片| 桂东县| 台中市| 金阳县| 顺昌县| 凤冈县| 玉田县| 麻城市| 临城县| 遂昌县| 望奎县| 杭锦后旗| 汶川县| 怀集县| 武陟县| 乐清市| 富宁县| 织金县| 临高县| 建平县| 翁牛特旗| 晋州市| 玉溪市| 北流市| 崇礼县| 枣强县| 台中县| 谢通门县| 晋中市| 亚东县| 化德县|