๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Kali Linux Hacking

โœ Scribed by Ethem Mining


Tongue
English
Leaves
113
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Introduction
Part I
Introduction to Kali Linux and Hacking
Chapter 1: Introduction to Hacking
What is Hacking?
Malware
Session Hijacking
SQL Injection
Phishing
DOS
Reasons for Hacking
Black Hats
Grey Hats
Red Hats
Green Hats
Blue Hats
Script Kiddies
Hacktivists
White Hat (Ethical Hacking)
What is Cybersecurity?
The Elements of Cybersecurity
Information Security: The CIA Triad
Confidentiality
Integrity
Availability
Chapter 2: Introduction to Networking
What is a Network?
Types of Networks
LAN
WAN
VPN
Network Address
Nodes
Hosts
IP Address
Public vs. Private IP address
Chapter 3: Kali Linux: The Hacker Operating System
What is Linux?
What is Kali Linux?
Should I use Kali Linux?
Kali Linux Features
Hundreds of Penetration Testing Tools
Free
Secure
Customizable
Multi-Language Support
Open Source Git Tree
FHS Compliant
Wireless Device Support
Custom Kernel
How to Install Kali Linux
What You Need for Installation
Creating the Bootable USB with Linux
Chapter 4: Basic Linux Commands
The Terminal
Command Prompts
Executing the Commands
Archives
Directory Navigation
Disk Usage
File and Directory Commands
File Transfers
Hardware Information Commands
Installing Packages
Networking
Performance Monitoring
Process Management
Search
SSH Logins
System Information Commands
User Information and Management Commands
Part II
Kali Linux Hacking
Chapter 5: Nmap and Detecting and Exploiting Vulnerabilities
What is Nmap?
How to Use Nmap to Understand and Exploit Vulnerabilities
Scanning Commands
Scanning Techniques and Commands
TCP SYN Scan
TCP Connect() Scan
UDP Scan
FIN Scan
Ping Scan
Version Detection
Idle Scanning
Penetration Testing
Pre-Engagement
Reconnaissance
Chapter 6: How to Become and Remain Anonymous
Proxychains
VPN
Tor and Kali Linux
Chapter 7: Metasploit Framework
What is Metasploit?
Metasploit Users
Metasploit Modules
Using Metasploit
Installing Metasploit
Managing the Metasploit Database
The Metasploit Datastore
The Metasploit Workspaces
Chapter 8: Digital Certificate
What is a Digital Certificate?
Certificate Authorities
Types of Certificates
Root Certificate
Intermediate Certificate
SSL Certificate
Generating Self-Signed SSL Certificates
Chapter 9: Bash and Python Scripting
Conclusion
Assigning an IP address
Protocol Layers
Internet Protocol (IP)
The TCP/IP Model
Threats to Network Security
Man-in-the-Middle
Cyberattacks
DOS and DDOS
MAC Spoofing
Threat Modeling and Identifying Vulnerabilities
Exploitation
Post-Exploitation
Reporting
Retesting


๐Ÿ“œ SIMILAR VOLUMES


Wireless Hacking: Introduction to Wirele
๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Memetics Ireland Ltd. ๐ŸŒ English

<span>Introduction to Wireless Hacking with Kali Linux. Understanding the need to test your wireless systems. Wireless vulnerabilities. Thinking like a hacker. Introduction To Kali and WiFi Pen Testing.</span>

Computer Hacking: 2 Books in 1: Linux fo
โœ Jason Knox ๐Ÿ“‚ Library ๐ŸŒ English

<h3><span>Imagine if you could know how to use a system that is easy to work with, and has a fewer vulnerabilities to attack.ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  ย  Imagine to have the knowledge to understand the reasons why a hacker could attack your computer, how he

Learning Kali Linux: Security Testing, P
โœ Ric Messier ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› O'Reilly Media, Inc, USA ๐ŸŒ English

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali's expansive security capab