<span>Advanced Security Testing with Kali Linux - the last book in my offensive security with Kali training books. This book picks up where my previous ones left off and dives deeper into more advanced security topics. You will learn about AV bypass, Command & Control (C2) frameworks, Web App pe
Advanced Security Testing with Kali Linux
โ Scribed by Daniel W. Dieterle
- Tongue
- English
- Leaves
- 611
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Dedication
About the Author
Special Thanks
Part I - Introduction & Installing
Chapter 1
Chapter 2
Chapter 3
Part II - The MITRE ATT@CK Framework
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Part III - Reconnaissance & Scanning
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Part IV - Website Attacks
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 17
Chapter 18
Chapter 19
Chapter 20
Chapter 21
Part V - Bypassing Antivirus & Shellcode
Chapter 22
Chapter 23
Chapter 24
Chapter 25
Chapter 26
Part VI - Password Attacks
Chapter 27
Part VII - Privilege Escalation
Chapter 28
Chapter 29
Chapter 30
Part VIII - Pentesting & Post-Exploitation with PowerShell
Chapter 31
Chapter 32
Chapter 33
Part IX - Command and Control
Chapter 34
Chapter 35
Chapter 36
Chapter 37
Chapter 38
Chapter 39
Chapter 40
Part X - Offensive Forensics
Chapter 41
Chapter 42
Chapter 43
Part XI - Hacking with IoT - Raspberry Pi
Chapter 44
Chapter 45
Part XII - Kali on Android - Bonus Chapter!
DuckHunter on Kali NetHunter
๐ SIMILAR VOLUMES
With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker woul
Mastering Kali Linux for Advanced Penetration Testing will provide you with a number or proven techniques to defeat the latest defences on the networks using Kali Linux. From selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid de