Packt Logo
Browse Library
Browse Library Advanced Search Sign In Start Free Trial
  • Book image
Book Image

Mastering Kali Linux for Advanced Penetration Testing

By : Robert Beggs
Buy this Book
Book Image

Mastering Kali Linux for Advanced Penetration Testing

By: Robert Beggs
Buy this Book

Overview of this book

Related Content you might be interested in

No titles found
Table of Contents (5 chapters)
Preface
Preface
The "Kill Chain" approach to penetration testing
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Free Chapter
1
Disclaimer
Disclaimer
2
1. The Attacker's Kill Chain
1. The Attacker's Kill Chain
1. Starting with Kali Linux
2. Identifying the Target – Passive Reconnaissance
3. Active Reconnaissance and Vulnerability Scanning
4. Exploit
5. Post Exploit – Action on the Objective
6. Post Exploit – Persistence
3
2. The Delivery Phase
2. The Delivery Phase
7. Physical Attacks and Social Engineering
8. Exploiting Wireless Communications
9. Reconnaissance and Exploitation of Web-based Applications
10. Exploiting Remote Access Communications
11. Client-side Exploitation
A. Installing Kali Linux
4
Index
Index
Customer Reviews
5 star
0
4 star
0
3 star
0
2 star
0
1 star
0

Part 1. The Attacker's Kill Chain

Starting with Kali Linux

Identifying the Target – Passive Reconnaissance

Active Reconnaissance and Vulnerability Scanning

Exploit

Post Exploit – Action on the Objective

Post Exploit – Persistence

Previous Section
End of Section 1
Next Section