Key Features
Book Description
What you will learn
- Employ the methods used by real hackers effectively, to ensure the most effective penetration testing of your network
- Select and configure the most effective tools from Kali Linux to test network security
- Employ stealth to avoid detection in the network being tested
- Recognize when stealthy attacks are being used against your network
- Exploit networks and data systems using wired and wireless networks as well as web services
- Identify and download valuable data from target systems
- Maintain access to compromised systems
- Use social engineering to compromise the weakest part of the network—the end users
Who this book is for
Table of Contents
- Kali quickstart
- Passive enumeration?
- Active enumeration (including vulnerability scanning)
- Exploitation
- Post Compromise - Data Harvesting, Priv Escalation
- Post Compromise - Maintaining Access, Exfiltration
- Physical security
- Attacking Wireless Communications
- Attacking web-based applications?
- Attacking remote access???
- Client-side exploitation
- Appendix: Creating a test environment?
Loading...
Loading...
Loading...

