Post Description
Geef de servers wat tijd om te syncen, heb hem net pas erop gezet, veel plezier met dit boek.
het boek is trouwens in pdf formaat.
greets HellDog73.
Recipes designed to educate you extensively on the penetration testing principles and Kali Linux tools
Learning to use Kali Linux tools, such as Metasploit, Wire Shark, and many more through in-depth and structured instructions
Teaching you in an easy-to-follow style, full of examples, illustrations, and tips that will suit experts and novices alike
Table of Contents
Preface
Chapter 1: Up and Running with Kali Linux
Chapter 2: Customizing Kali Linux
Chapter 3: Advanced Testing Lab
Chapter 4: Information Gathering
Chapter 5: Vulnerability Assessment
Chapter 6: Exploiting Vulnerabilities
Chapter 7: Escalating Privileges
Chapter 8: Password Attacks
Chapter 9: Wireless Attacks
Index
##Preface
Up
##Chapter 1: Up and Running with Kali Linux
##Introduction
##Installing to a hard disk drive
##Installing to a USB drive with persistent memory
##Installing in VirtualBox
##Installing VMware Tools
##Fixing the splash screen
##Starting network services
##Setting up the wireless network
Up
##Chapter 2: Customizing Kali Linux
##Introduction
##Preparing kernel headers
##Installing Broadcom drivers
##Installing and configuring ATI video card drivers
##Installing and configuring nVidia video card drivers
##Applying updates and configuring extra security tools
##Setting up ProxyChains
##Directory encryption
Up
##Chapter 3: Advanced Testing Lab
##Introduction
##Getting comfortable with VirtualBox
##Downloading Windows Targets
##Downloading Linux Targets
##Attacking WordPress and other applications
Up
##Chapter 4: Information Gathering
##Introduction
##Service enumeration
##Determining network range
##Identifying active machines
##Finding open ports
##Operating system fingerprinting
##Service fingerprinting
##Threat assessment with Maltego
##Mapping the network
Up
##Chapter 5: Vulnerability Assessment
##Introduction
##Installing, configuring, and starting Nessus
##Nessus - finding local vulnerabilities
##Nessus - finding network vulnerabilities
##Nessus - finding Linux-specific vulnerabilities
##Nessus - finding Windows-specific vulnerabilities
##Installing, configuring, and starting OpenVAS
##OpenVAS - finding local vulnerabilities
##OpenVAS - finding network vulnerabilities
##OpenVAS - finding Linux-specific vulnerabilities
##OpenVAS - finding Windows-specific vulnerabilities
Up
##Chapter 6: Exploiting Vulnerabilities
##Introduction
##Installing and configuring Metasploitable
##Mastering Armitage, the graphical management tool for Metasploit
##Mastering the Metasploit Console (MSFCONSOLE)
##Mastering the Metasploit CLI (MSFCLI)
##Mastering Meterpreter
##Metasploitable MySQL
##Metasploitable PostgreSQL
##Metasploitable Tomcat
##Metasploitable PDF
##Implementing browser_autopwn
Up
##Chapter 7: Escalating Privileges
##Introduction
##Using impersonation tokens
##Local privilege escalation attack
##Mastering the Social Engineering Toolkit (SET)
##Collecting the victim's data
##Cleaning up the tracks
##Creating a persistent backdoor
##Man In The Middle (MITM) attack
Up
##Chapter 8: Password Attacks
##Introduction
##Online password attacks
##Cracking HTTP passwords
##Gaining router access
##Password profiling
##Cracking a Windows password using John the Ripper
##Using dictionary attacks
##Using rainbow tables
##Using nVidia Compute Unified Device Architecture (CUDA)
##Using ATI Stream
##Physical access attacks
Up
##Chapter 9: Wireless Attacks
##Introduction
##Wireless network WEP cracking
##Wireless network WPA/WPA2 cracking
##Automating wireless network cracking
##Accessing clients using a fake AP
##URL traffic manipulation
##Port redirection
##Sniffing network traffic
Comments # 0