Penetration Testing with Kali Linux 1st edition by Offensive Security – Ebook PDF Instant Download/Delivery
Full download Penetration Testing with Kali Linux 1st edition after payment

Product details:
• Author: Offensive Security
All rights reserved to Offensive Security, 2018 © No part of this publication, in whole or in part, may be reproduced, copied, transferred or any other right reserved to its copyright owner, including photocopying and all other copying, any transfer or transmission using any network or other means of communication, any broadcast for distant learning, in any form or by any means such as any information storage, transmission or retrieval system, without prior written permission from the author.
Penetration Testing with Kali Linux 1st Table of contents:
0. – Penetration Testing: What You Should Know
0.1 – About Kali Linux
0.2 – About Penetration Testing
0.3 – Legal
0.4 – The megacorpone.com Domain
0.5 – Offensive Security Labs
1. – Getting Comfortable with Kali Linux
1.1 – Finding Your Way Around Kali
1.2 – Managing Kali Linux Services
1.3 – The Bash Environment
2. – The Essential Tools
2.1 – Netcat
2.2 – Ncat
2.3 – Wireshark
2.4 – Tcpdump
3. – Passive Information Gathering
3.1 – Open Web Information Gathering
3.2 – Email Harvesting
3.3 – Additional Resources
3.4 – Recon-ng
4. – Active Information Gathering
4.1 – DNS Enumeration
4.2 – Port Scanning
4.3 – SMB Enumeration
4.4 – SMTP Enumeration
4.5 – SNMP Enumeration
5. – Vulnerability Scanning
5.1 – Vulnerability Scanning with Nmap
5.2 – The OpenVAS Vulnerability Scanne
6. – Buffer Overflows
6.1 – Fuzzing
7. – Win32 Buffer Overflow Exploitation
OS-40813 Rody Shahnazarian
Penetration Testing with Kali Linux
PWK Copyright © 2018 Offensive Security Ltd. All rights reserved. Page 7 of 380
7.1 – Replicating the Crash
7.2 – Controlling EIP
7.3 – Locating Space for Your Shellcode
7.4 – Checking for Bad Characters
7.5 – Redirecting the Execution Flow
7.6 – Generating Shellcode with Metasploit
7.7 – Getting a Shell
7.8 – Improving the Exploit
8. – Linux Buffer Overflow Exploitation
9. – Working with Exploits
9.1 – Searching for Exploits
9.2 – Customizing and Fixing Exploits
10. – File Transfers
10.1 – A Word About Anti Virus Software
10.2 – File Transfer Methods
11. – Privilege Escalation
11.1 – Privilege Escalation Exploits
11.2 – Configuration Issues
12. – Client Side Attacks
12.1 – Know Your Target
12.2 – MS12-037- Internet Explorer 8 Fixed Col Span ID
12.3 – Java Signed Applet Attack
13. – Web Application Attacks
13.1 – Essential Firefox Add-ons
13.2 – Cross Site Scripting (XSS)
13.3 – File Inclusion Vulnerabilities
13.4 – MySQL SQL Injection
13.5 – Web Application Proxies
OS-40813 Rody Shahnazarian
Penetration Testing with Kali Linux
PWK Copyright © 2018 Offensive Security Ltd. All rights reserved. Page 10 of 380
13.6 – Automated SQL Injection Tools
14. – Password Attacks
14.1 – Preparing for Brute Force
14.2 – Online Password Attacks
14.3 – Password Hash Attacks
15. – Port Redirection and Tunneling
15.1 – Port Forwarding/Redirection
15.2 – SSH Tunneling
OS-40813 Rody Shahnazarian
Penetration Testing with Kali Linux
PWK Copyright © 2018 Offensive Security Ltd. All rights reserved.
15.2.1 – Local Port Forwarding
15.2.2 – Remote Port Forwarding
15.2.3 – Dynamic Port Forwarding
15.3 – Proxychains
15.4 – HTTP Tunneling
15.5 – Traffic Encapsulation
16. – The Metasploit Framework
16.1 – Metasploit User Interfaces
16.2 – Setting up Metasploit Framework on Kali
16.3 – Exploring the Metasploit Framework
16.4 – Auxiliary Modules
16.5 – Exploit Modules
16.6 – Metasploit Payloads
16.7 – Building Your Own MSF Module
OS-40813 Rody Shahnazarian
Penetration Testing with Kali Linux
PWK Copyright © 2018 Offensive Security Ltd. All rights reserved. Page 12 of 380
16.7.1 – Exercise
16.8 – Post Exploitation with Metasploit
16.8.1 – Meterpreter Post Exploitation Features
16.8.2 – Post Exploitation Modules
17. – Bypassing Antivirus Software
17.1 – Encoding Payloads with Metasploit
17.2 – Crypting Known Malware with Software Protectors
17.3 – Using Custom/Uncommon Tools and Payloads
17.4 – Exercise
18. – Assembling the Pieces: Penetration Test Breakdown
18.1 – Phase 0 – Scenario Description
18.2 – Phase 1 – Information Gathering
18.3 – Phase 2 – Vulnerability Identification and Prioritization
18.4 – Phase 3 – Research and Development
18.5 – Phase 4 – Exploitation
18.6 – Phase 5 – Post-Exploitation
Penetration Testing with Kali Linux
PWK Copyright © 2018 Offensive Security Ltd. All rights reserved. Page 13 of 380
18.6.8 – Going for the Kill .
People also search for Penetration Testing with Kali Linux 1st :
penetration testing with kali linux offensive security
penetration testing with kali linux offensive security pdf
using kali linux for penetration testing
penetration testing with kali linux
penetration testing with kali