Basic security testing with Kali Linux /
Dieterle, Daniel W.
Basic security testing with Kali Linux / Daniel W. Dieterle. - 3rd ed. - [S.l. : s.n.], c2018. - xv, 410 p. : ill.
Includes index.
Chapter 1 What is Kali Linux? -- Chapter 2 Installing Virtual Machines -- Chapter 3 Introduction to Kali Linux -- Chapter 4 Reconnaissance with Recon-NG -- Chapter 5 Shodan -- Chapter 6 Additional Recon Tools -- Chapter 7 Introduction to Metasploit -- Chapter 8 Meterpreter Shell -- Chapter 9 Metasploitable2 Tutorial - Part One -- Chapter 10 Metasploitable - Part Two: Scanners -- Chapter 11 Bypassing Anti-Virus -- Chapter 12 Windows Privilege Escalation by Bypassing UAC -- Chapter 13 Man-in-the-Middle Attacks -- Chapter 14 Man-in-the-Middle Framework & BeEF -- Chapter 15 Service Poisoning with Responder, Multi-Relay and MITMf -- Chapter 16 Social Engineering Introduction -- Chapter 17 Determining Hash Type & Cracking LM Passwords -- Chapter 18 Pass the Hash -- Chapter 19 Wordlists -- Chapter 20 John the Ripper & HashCat -- Chapter 21 Cracking Linux Password -- Chapter 22 Mimikatz-Plain Text Passwords -- Chapter 23 Keyscan, Lockout Keylogger, and Step Recorder -- Chapter 24 Wireless Network Attack -- Chapter 25 Fern WIFI Cracking & WiFite -- Chapter 26 Rough Wi-Fi Router Attacks with Mana -- Chapter 27 Raspberry Pi -- Chapter 28 Kali NetHunter -- Chapter 29 Network Defense and Conclusion.
9781725031982 1725031981
Linux.
Penetration testing (Computer security)
Computer networks--Security measures.
QA76.9.A25 / D587 2018
Basic security testing with Kali Linux / Daniel W. Dieterle. - 3rd ed. - [S.l. : s.n.], c2018. - xv, 410 p. : ill.
Includes index.
Chapter 1 What is Kali Linux? -- Chapter 2 Installing Virtual Machines -- Chapter 3 Introduction to Kali Linux -- Chapter 4 Reconnaissance with Recon-NG -- Chapter 5 Shodan -- Chapter 6 Additional Recon Tools -- Chapter 7 Introduction to Metasploit -- Chapter 8 Meterpreter Shell -- Chapter 9 Metasploitable2 Tutorial - Part One -- Chapter 10 Metasploitable - Part Two: Scanners -- Chapter 11 Bypassing Anti-Virus -- Chapter 12 Windows Privilege Escalation by Bypassing UAC -- Chapter 13 Man-in-the-Middle Attacks -- Chapter 14 Man-in-the-Middle Framework & BeEF -- Chapter 15 Service Poisoning with Responder, Multi-Relay and MITMf -- Chapter 16 Social Engineering Introduction -- Chapter 17 Determining Hash Type & Cracking LM Passwords -- Chapter 18 Pass the Hash -- Chapter 19 Wordlists -- Chapter 20 John the Ripper & HashCat -- Chapter 21 Cracking Linux Password -- Chapter 22 Mimikatz-Plain Text Passwords -- Chapter 23 Keyscan, Lockout Keylogger, and Step Recorder -- Chapter 24 Wireless Network Attack -- Chapter 25 Fern WIFI Cracking & WiFite -- Chapter 26 Rough Wi-Fi Router Attacks with Mana -- Chapter 27 Raspberry Pi -- Chapter 28 Kali NetHunter -- Chapter 29 Network Defense and Conclusion.
9781725031982 1725031981
Linux.
Penetration testing (Computer security)
Computer networks--Security measures.
QA76.9.A25 / D587 2018
