Kali Linux Penetration Testing Bible. Gus Khawaja. Читать онлайн. Newlib. NEWLIB.NET

Автор: Gus Khawaja
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная компьютерная литература
Год издания: 0
isbn: 9781119719076
Скачать книгу

      

      Table of Contents

      1  Cover

      2  Title Page

      3  Introduction What Does This Book Cover? Companion Download Files How to Contact the Publisher How to Contact the Author

      4  CHAPTER 1: Mastering the Terminal Window Kali Linux File System Managing Users and Groups in Kali Files and Folders Management in Kali Linux Remote Connections in Kali Kali Linux System Management Networking in Kali Linux Summary

      5  CHAPTER 2: Bash Scripting Basic Bash Scripting Printing to the Screen in Bash Variables Script Parameters User Input Functions Conditions and Loops Summary

      6  CHAPTER 3: Network Hosts Scanning Basics of Networking Network Scanning DNS Enumeration Summary

      7  CHAPTER 4: Internet Information Gathering Passive Footprinting and Reconnaissance Summary

      8  CHAPTER 5: Social Engineering Attacks Spear Phishing Attacks Payloads and Listeners Social Engineering with the USB Rubber Ducky Summary

      9  CHAPTER 6: Advanced Enumeration Phase Transfer Protocols E‐mail Protocols Database Protocols CI/CD Protocols Web Protocols 80/443 Graphical Remoting Protocols File Sharing Protocols Summary

      10  CHAPTER 7: Exploitation Phase Vulnerabilities Assessment Services Exploitation Summary

      11  CHAPTER 8: Web Application Vulnerabilities Web Application Vulnerabilities Summary

      12  CHAPTER 9: Web Penetration Testing and Secure Software Development Lifecycle Web Enumeration and Exploitation Secure Software Development Lifecycle Summary

      13  CHAPTER 10: Linux Privilege Escalation Introduction to Kernel Exploits and Missing Configurations Kernel Exploits SUID Exploitation Overriding the Passwd Users File CRON Jobs Privilege Escalation sudoers Exploiting Running Services Automated Scripts Summary

      14  CHAPTER 11: Windows Privilege Escalation Windows System Enumeration File Transfers Windows System Exploitation Summary

      15  CHAPTER 12: Pivoting and Lateral Movement