
Kali Linux Intrusion and Exploitation Cookbook
Powerful recipes to detect vulnerabilities and perform security assessments
Publisher:Packt Publishing Limited
By: Dhruv Shah and Ishan Girdhar
Paid access
|Jun 2024Table of Contents
- Setting up environment
- Network Information Gathering
- Vulnerability Assessment
- Exploitation
- Information Gathering and Scanning
- Dive into Network
- Exploitation and Advanced Techniques
- System Exploitation
- Privilege Escalation & Post Exploitation
- Wireless Information Gathering
- Appendices
PDF ISBN: 978-1-78398-217-2
Publisher: Packt Publishing Limited
Copyright owner: © 2017 Packt Publishing Limited
Publication date: 2024
Language: English
Pages: 512
Related subjects:
