Cargando…

Kali Linux Penetration Testing Bible /

Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali's varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Khawaja, Gus (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Indiana : John Wiley & Sons, Inc., [2021]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • About the Author
  • About the Technical Editor
  • Acknowledgments
  • Contents at a Glance
  • Contents
  • Introduction
  • What Does This Book Cover?
  • Companion Download Files
  • How to Contact the Publisher
  • How to Contact the Author
  • Chapter 1 Mastering the Terminal Window
  • Kali Linux File System
  • Terminal Window Basic Commands
  • Tmux Terminal Window
  • Starting Tmux
  • Tmux Key Bindings
  • Tmux Session Management
  • Navigating Inside Tmux
  • Tmux Commands Reference
  • Managing Users and Groups in Kali
  • Users Commands
  • Groups Commands
  • Managing Passwords in Kali
  • Files and Folders Management in Kali Linux
  • Displaying Files and Folders
  • Permissions
  • Manipulating Files in Kali
  • Searching for Files
  • Files Compression
  • Manipulating Directories in Kali
  • Mounting a Directory
  • Managing Text Files in Kali Linux
  • Vim vs. Nano
  • Searching and Filtering Text
  • Remote Connections in Kali
  • Remote Desktop Protocol
  • Secure Shell
  • SSH with Credentials
  • Passwordless SSH
  • Kali Linux System Management
  • Linux Host Information
  • Linux OS Information
  • Linux Hardware Information
  • Managing Running Services
  • Package Management
  • Process Management
  • Networking in Kali Linux
  • Network Interface
  • IPv4 Private Address Ranges
  • Static IP Addressing
  • DNS
  • Established Connections
  • File Transfers
  • Summary
  • Chapter 2 Bash Scripting
  • Basic Bash Scripting
  • Printing to the Screen in Bash
  • Variables
  • Commands Variable
  • Script Parameters
  • User Input
  • Functions
  • Conditions and Loops
  • Conditions
  • Loops
  • File Iteration
  • Summary
  • Chapter 3 Network Hosts Scanning
  • Basics of Networking
  • Networking Protocols
  • TCP
  • UDP
  • Other Networking Protocols
  • IP Addressing
  • IPv4
  • Subnets and CIDR
  • IPv6
  • Port Numbers
  • Network Scanning
  • Identifying Live Hosts
  • Ping
  • ARP
  • Nmap
  • Port Scanning and Services Enumeration
  • TCP Port SYN Scan
  • UDP
  • Basics of Using Nmap Scans
  • Services Enumeration
  • Operating System Fingerprinting
  • Nmap Scripting Engine
  • NSE Category Scan
  • NSE Arguments
  • DNS Enumeration
  • DNS Brute-Force
  • DNS Zone Transfer
  • DNS Subdomains Tools
  • Fierce
  • Summary
  • Chapter 4 Internet Information Gathering
  • Passive Footprinting and Reconnaissance
  • Internet Search Engines
  • Shodan
  • Google Queries
  • Information Gathering Using Kali Linux
  • Whois Database
  • TheHarvester
  • DMitry
  • Maltego
  • Summary
  • Chapter 5 Social Engineering Attacks
  • Spear Phishing Attacks
  • Sending an E-mail
  • The Social Engineer Toolkit
  • Sending an E-mail Using Python
  • Stealing Credentials
  • Payloads and Listeners
  • Bind Shell vs. Reverse Shell
  • Bind Shell
  • Reverse Shell
  • Reverse Shell Using SET
  • Social Engineering with the USB Rubber Ducky
  • A Practical Reverse Shell Using USB Rubber Ducky and PowerShell
  • Generating a PowerShell Script
  • Starting a Listener
  • Hosting the PowerShell Script