官术网_书友最值得收藏!

What this book covers

Chapter 1, Introduction to Kali NetHunter, introduces Kali NetHunter and describes some of the tools within its mobile platform. You'll learn about the Android platform and its security model, and finally you'll learn how to install the Kali NetHunter platform on an Android device.

Chapter 2, Understanding the Phases of the Pentesting Process, covers the importance and need for penetration testing in the digital world. You'll learn about the different types of threat actors and cyber security teams within an organization. Furthermore, you'll learn the basics of penetration testing by learning about the phases and various frameworks.

Chapter 3, Intelligence Gathering Tools, explores the various methods and resources a penetration tester can use to obtain information about a target.

Chapter 4, Scanning and Enumeration Tools, covers an overview of scanning and enumeration. You'll learn about various scanning techniques and tools in order to better profile a target. Additionally, using numerous techniques and tools, you'll be able to extraction information from the target using the process of enumeration.

Chapter 5, Penetrating the Target, covers some top tips for successfully exploiting a system and gaining access. By the end of this chapter, you'll be able to use various techniques to gain access to a target.

Chapter 6, Clearing Tracks and Removing Evidence from a Target, covers the importance of clearing your tracks as a penetration tester. You'll learn about various types of logs and their locations, a number of utilities and tools to assist in clearing log data, and removing files from both Windows and Linux systems.

Chapter 7, Packet Sniffing and Traffic Analysis, explores various packet sniffing techniques, tools, and devices. At the end of the chapter, you will be able to perform packet sniffing using a number of native tools within Kali NetHunter. Additionally, you'll learn how to analyze data using some very well-known tools.

Chapter 8, Targeting Wireless Devices and Networks, covers the types of wireless networks, standards, and topologies. You'll learn about a wide array of threats and attacks that occur on wireless networks and will be able to perform these attacks yourself.

Chapter 9, Avoiding Detection, covers the fundamentals a penetration tester needs to know and understand in order to be stealthy using various techniques during a penetration test.

Chapter 10, Hardening Techniques and Countermeasures, covers commonly-found threats in the digital world and explains how to secure network appliances, client and server operating systems, and mobile devices.

Chapter 11, Building a Lab, covers the requirements and process of setting up a personal penetration testing lab environment, as well as how to assemble it.

Chapter 12, Selecting A Kali Device and Hardware, helps you choose a suitable device for Kali NetHunter.

主站蜘蛛池模板: 衢州市| 手机| 丰原市| 吕梁市| 铁力市| 井冈山市| 潮安县| 谷城县| 简阳市| 普安县| 昌邑市| 金乡县| 栖霞市| 吴桥县| 镇雄县| 宜黄县| 新乐市| 策勒县| 瑞安市| 甘泉县| 治县。| 永济市| 麦盖提县| 弥渡县| 博客| 博爱县| 油尖旺区| 淮南市| 江津市| 扶余县| 阳朔县| 秀山| 长宁区| 孝昌县| 田阳县| 西乡县| 大城县| 达日县| 固安县| 博客| 甘南县|