Have a personal or library account? Click to login
Mastering Kali Linux for Advanced Penetration Testing Cover

Mastering Kali Linux for Advanced Penetration Testing

This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual.

Paid access
|Jul 2014
Product purchase options

Key Features

    Book Description

    What you will learn

    • Employ the methods used by real hackers effectively, to ensure the most effective penetration testing of your network
    • Select and configure the most effective tools from Kali Linux to test network security
    • Employ stealth to avoid detection in the network being tested
    • Recognize when stealthy attacks are being used against your network
    • Exploit networks and data systems using wired and wireless networks as well as web services
    • Identify and download valuable data from target systems
    • Maintain access to compromised systems
    • Use social engineering to compromise the weakest part of the network—the end users

    Who this book is for

    Table of Contents

    1. Kali quickstart
    2. Passive enumeration?
    3. Active enumeration (including vulnerability scanning)
    4. Exploitation
    5. Post Compromise - Data Harvesting, Priv Escalation
    6. Post Compromise - Maintaining Access, Exfiltration
    7. Physical security
    8. Attacking Wireless Communications
    9. Attacking web-based applications?
    10. Attacking remote access???
    11. Client-side exploitation
    12. Appendix: Creating a test environment?
    PDF ISBN: 978-1-78216-313-8
    Publisher: Packt Publishing Limited
    Copyright owner: © 2014 Packt Publishing Limited
    Publication date: 2014
    Language: English
    Pages: 356