- Kali Linux Network Scanning Cookbook
- Justin Hutchens
- 199字
- 2021-09-03 09:57:59
What this book covers
Chapter 1, Getting Started, introduces the underlying principles and concepts that will be used throughout the remainder of the book.
Chapter 2, Discovery Scanning, covers techniques and scanning tools that can be used to identify live systems on a target network, by performing layer 2, layer 3, and layer 4 discovery.
Chapter 3, Port Scanning, includes techniques and scanning tools that can be used to enumerate running UDP and TCP services on a target system.
Chapter 4, Fingerprinting, explains techniques and scanning tools that can be used to identify the operating system and services running on a target system.
Chapter 5, Vulnerability Scanning, covers techniques and scanning tools that can be used to identify and enumerate potential vulnerabilities on a target system.
Chapter 6, Denial of Service, introduces techniques and attack tools that can be used to exploit denial of service vulnerabilities identified on a target system.
Chapter 7, Web Application Scanning, provides techniques and tools that can be used to identify and exploit web application vulnerabilities on a target system.
Chapter 8, Automating Kali Tools, introduces scripting techniques that can be used to streamline and automate the use of existing tools in Kali Linux.
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- 安全實(shí)戰(zhàn)之滲透測(cè)試
- Getting Started with FortiGate
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- 計(jì)算機(jī)病毒原理與防范(第2版)
- 黑客攻防與無(wú)線安全從新手到高手(超值版)
- 代碼審計(jì):企業(yè)級(jí)Web代碼安全架構(gòu)
- Kali Linux Wireless Penetration Testing Cookbook
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實(shí)踐指南
- 移動(dòng)APT:威脅情報(bào)分析與數(shù)據(jù)防護(hù)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- 構(gòu)建新型網(wǎng)絡(luò)形態(tài)下的網(wǎng)絡(luò)空間安全體系