官术网_书友最值得收藏!

Preface

This book begins with the installation and configuration of Kali Linux to help you perform your tests. You will then learn about methods that will help you gather intel and perform web application exploitation using tools such as Burp. Moving forward, you will also learn how to perform network exploitation by generating payloads using MSFPC, Metasploit, and Cobalt Strike. Next, you will learn about monitoring and cracking wireless networks using Aircrack, Fluxion, and Wifi-Pumpkin. After that, you will learn how to analyze, generate, and crack passwords using tools such as Patator, John the Ripper, and ceWL. Later, you will also learn about some of the tools that help in forensic investigations. Lastly, you will learn how to create an optimum quality pentest report!

By the end of this book, you will know how to conduct advanced and efficient penetration testing activities thanks to the book's crisp and task-oriented recipes.

主站蜘蛛池模板: 通江县| 二手房| 彭阳县| 高陵县| 美姑县| 金塔县| 昌吉市| 兴安盟| 涡阳县| 新安县| 师宗县| 陕西省| 林芝县| 会同县| 湘乡市| 德保县| 郁南县| 桑植县| 樟树市| 龙门县| 汤阴县| 青浦区| 静海县| 景宁| 班戈县| 顺义区| 山阳县| 祁连县| 三江| 定陶县| 航空| 咸丰县| 抚松县| 竹北市| 屏边| 涟源市| 华宁县| 手机| 简阳市| 海林市| 小金县|