๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Ethical hacking with Kali Linux: learn fast how to hack like a pro

โœ Scribed by Hugo Hoffman


Tongue
English
Leaves
153
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Chapter 1 Introduction to Linux......................................................................................................
Chapter 2 Software & Hardware Recommendations.......................................................................
Chapter 3 Installing Virtual Box & Kali Linux................................................................................
Chapter 4 Introduction to Penetration Testing................................................................................
Chapter 5 Pen Testing @ Stage 1....................................................................................................
Chapter 6 Pen Testing @ Stage 2....................................................................................................
Chapter 7 Pen Testing @ Stage 3....................................................................................................
Chapter 8 Penetration Testing Standards.......................................................................................
Chapter 9 Introduction to Footprinting...........................................................................................
Chapter 10 Host discovery with Port Scanning...............................................................................
Chapter 11 Device discovery with Hping3......................................................................................
Chapter 12 Burp Suite Proxy setup.................................................................................................
Chapter 13 Target setup for Burp Scanner.....................................................................................
Chapter 14 Randomizing Sessions Tokens......................................................................................
Chapter 15 Burp Spider-ing & SQL Injection..................................................................................
Chapter 16 SQL Injection with SQLmap..........................................................................................
Chapter 17 Dictionary Attack with Airodump-ng............................................................................
Chapter 18 ARP Poisoning with EtterCAP.......................................................................................
Chapter 19 Capturing Traffic with Port Mirroring..........................................................................
Chapter 20 Passive Reconnaissance with Kali.................................................................................
Chapter 21 Capturing SYN Scan Attack..........................................................................................
Chapter 22 Traffic Capturing with Xplico........................................................................................
Chapter 23 MITM Attack with Ettercap..........................................................................................
Chapter 24 MITM Attack with SSLstrip..........................................................................................
Chapter 25 Packet Manipulation with Scapy...................................................................................
Chapter 26 Deauthentication Attack against Rogue AP..................................................................
Chapter 27 IPv6 Packet Capturing with Parasite6..........................................................................
Chapter 28 Evil Twin Deauthentication Attack with mdk3..............................................................
Chapter 29 DoS Attack with MKD3.................................................................................................
Chapter 30 Brute Force Attack with TCP Hydra.............................................................................
Chapter 31 Armitage Hail Mary......................................................................................................
Chapter 32 The Metasploit Framework...........................................................................................
Chapter 33 Social-Engineering Toolkit............................................................................................
Conclusion........................................................................................................................................
About the Author..............................................................................................................................


๐Ÿ“œ SIMILAR VOLUMES


Learning Kali Linux: Security Testing, P
โœ Ric Messier ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› O'Reilly Media, Inc, USA ๐ŸŒ English

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali's expansive security capab

Learning Kali Linux: Security Testing, P
โœ Ric Messier ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› O'Reilly Media ๐ŸŒ English

With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the too

Learning Kali Linux: Security Testing, P
โœ Ric Messier ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› O'Reilly Media ๐ŸŒ English

<p><span>With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates t