Читать книгу Kali Linux Penetration Testing Bible - Gus Khawaja - Страница 2

Table of Contents

Оглавление

Cover

Title Page

Introduction What Does This Book Cover? Companion Download Files How to Contact the Publisher How to Contact the Author

CHAPTER 1: Mastering the Terminal Window Kali Linux File System Managing Users and Groups in Kali Files and Folders Management in Kali Linux Remote Connections in Kali Kali Linux System Management Networking in Kali Linux Summary

CHAPTER 2: Bash Scripting Basic Bash Scripting Printing to the Screen in Bash Variables Script Parameters User Input Functions Conditions and Loops Summary

CHAPTER 3: Network Hosts Scanning Basics of Networking Network Scanning DNS Enumeration Summary

CHAPTER 4: Internet Information Gathering Passive Footprinting and Reconnaissance Summary

CHAPTER 5: Social Engineering Attacks Spear Phishing Attacks Payloads and Listeners Social Engineering with the USB Rubber Ducky Summary

CHAPTER 6: Advanced Enumeration Phase Transfer Protocols E‐mail Protocols Database Protocols CI/CD Protocols Web Protocols 80/443 Graphical Remoting Protocols File Sharing Protocols Summary

10  CHAPTER 7: Exploitation Phase Vulnerabilities Assessment Services Exploitation Summary

11  CHAPTER 8: Web Application Vulnerabilities Web Application Vulnerabilities Summary

12  CHAPTER 9: Web Penetration Testing and Secure Software Development Lifecycle Web Enumeration and Exploitation Secure Software Development Lifecycle Summary

13  CHAPTER 10: Linux Privilege Escalation Introduction to Kernel Exploits and Missing Configurations Kernel Exploits SUID Exploitation Overriding the Passwd Users File CRON Jobs Privilege Escalation sudoers Exploiting Running Services Automated Scripts Summary

14  CHAPTER 11: Windows Privilege Escalation Windows System Enumeration File Transfers Windows System Exploitation Summary

15  CHAPTER 12: Pivoting and Lateral Movement Dumping Windows Hashes Pivoting with Port Redirection Summary

16  CHAPTER 13: Cryptography and Hash Cracking Basics of Cryptography Cracking Secrets with Hashcat Summary

17  CHAPTER 14: Reporting Overview of Reports in Penetration Testing Scoring Severities Report Presentation Summary

18  CHAPTER 15: Assembly Language and Reverse Engineering CPU Registers Assembly Instructions Data Types Memory Segments Addressing Modes Reverse Engineering Example Summary

19  CHAPTER 16: Buffer/Stack Overflow Basics of Stack Overflow Stack Overflow Exploitation Summary

20  CHAPTER 17: Programming with Python Basics of Python Running Python Scripts Debugging Python Scripts Practicing Python Python Basic Syntaxes Variables More Techniques in Python Summary

21  CHAPTER 18: Pentest Automation with Python Penetration Test Robot Summary

22  APPENDIX A: APPENDIX AKali Linux Desktop at a Glance Downloading and Running a VM of Kali Linux Kali Xfce Desktop Summary

23  APPENDIX B: APPENDIX BBuilding a Lab Environment Using Docker Docker Technology Summary

24  Index

25  Copyright

26  About the Author

27  About the Technical Editor

28  Acknowledgments

29  End User License Agreement

Kali Linux Penetration Testing Bible

Подняться наверх