官术网_书友最值得收藏!

What this book covers

Chapter 1, Getting Started, introduces the underlying principles and concepts that will be used throughout the remainder of the book.

Chapter 2, Discovery Scanning, covers techniques and scanning tools that can be used to identify live systems on a target network, by performing layer 2, layer 3, and layer 4 discovery.

Chapter 3, Port Scanning, includes techniques and scanning tools that can be used to enumerate running UDP and TCP services on a target system.

Chapter 4, Fingerprinting, explains techniques and scanning tools that can be used to identify the operating system and services running on a target system.

Chapter 5, Vulnerability Scanning, covers techniques and scanning tools that can be used to identify and enumerate potential vulnerabilities on a target system.

Chapter 6, Denial of Service, introduces techniques and attack tools that can be used to exploit denial of service vulnerabilities identified on a target system.

Chapter 7, Web Application Scanning, provides techniques and tools that can be used to identify and exploit web application vulnerabilities on a target system.

Chapter 8, Automating Kali Tools, introduces scripting techniques that can be used to streamline and automate the use of existing tools in Kali Linux.

主站蜘蛛池模板: 威远县| 南平市| 修文县| 平度市| 博乐市| 津市市| 长武县| 沧源| 包头市| 锡林郭勒盟| 德保县| 蓝山县| 郁南县| 旌德县| 庆元县| 沛县| 中阳县| 容城县| 丽江市| 福贡县| 龙州县| 万盛区| 都昌县| 滕州市| 阿图什市| 咸阳市| 新昌县| 刚察县| 宜兴市| 平利县| 方正县| 五寨县| 富顺县| 闻喜县| 新蔡县| 清徐县| 南阳市| 龙州县| 南康市| 天柱县| 互助|