Penetration Testing With Kali Linux
Context of The Book
- Penetration Testing: What You Should Know
- Getting Comfortable with Kali Linux
- The Essential Tools (NetCat, Wireshark, Tcpdump etc...)
- Passive Information Gathering
- Active Information Gathering
- Vulnerability Scanning
- Buffer Overflows
- Win32 Buffer Overflow Exploitation
- Linux Buffer Overflow Exploitation
- Working with Exploit
- File Transfers
- Privilege Escalation
- Client Side Attacks
- Web Application Attacks
- Password Attacks
- Port Redirection and Tunneling
- The Metasploit Framework
- Bypassing Antivirus Software
- Assembling the Pieces: Penetration Test Breakdown
Download From: (MediaFire 18MB)
No comments:
Post a Comment