Table of Contents
- Introduction to Kali Nethunter
- Understanding the phases of Pentesting Process
- Intelligence-Gathering Tools
- Scanning and Enumeration Tools
- Penetrating the Target
- Clearing Tracks and Removing Evidence from a Target
- Packet Sniffing and Traffic Analysis
- Targeting Wireless Devices and Networks
- Avoiding Detection
- Hardening Techniques and Countermeasures
- Building a Lab
- Selecting a Kali Device and Hardware

