Book Image

Mastering Kali Linux [Video]

By : Aubrey Love II
Book Image

Mastering Kali Linux [Video]

By: Aubrey Love II

Overview of this book

<p>Become a master at any hackers game by discovering and understanding each of the major tools that every hacker is currently using.</p> <p>You will discover proper techniques to hack into any WordPress websites to test for vulnerabilities and weaknesses. Then dive deep into website and server scanning as well as network scanning and testing for any open security breaches. In addition, you will get introduced to bluetooth hacking for any open bluetooth enabled devices near you. Finally, explore the ultimate Social Engineering Toolkit embedded inside of your Kali machine.</p> <p>By the end of this course, you will have mastered Kali Linux in order to be the most efficient ethical hacker to carry out proper penetration testing upon your target, as well as discovering how to increase your own networks security.</p> <h2>Style and Approach</h2> <p>A step–by-step guide to help you learn different techniques you can use in order to optimize your pen-testing time, speed, and results.</p>
Table of Contents (7 chapters)
Chapter 7
Scanning and Testing Networks
Content Locked
Section 3
Find Services Actively Listening
While we go about our daily lives, Facebook, Google, Twitter, etc. are always constantly connected to our personal and business networks. But how much are they connected and why? - Learning about active services.