16 CHAPTER 13: Cryptography and Hash Cracking Basics of Cryptography Cracking Secrets with Hashcat Summary
17 CHAPTER 14: Reporting Overview of Reports in Penetration Testing Scoring Severities Report Presentation Summary
18 CHAPTER 15: Assembly Language and Reverse Engineering CPU Registers Assembly Instructions Data Types Memory Segments Addressing Modes Reverse Engineering Example Summary
19 CHAPTER 16: Buffer/Stack Overflow Basics of Stack Overflow Stack Overflow Exploitation Summary
20 CHAPTER 17: Programming with Python Basics of Python Running Python Scripts Debugging Python Scripts Practicing Python Python Basic Syntaxes Variables More Techniques in Python Summary
21 CHAPTER 18: Pentest Automation with Python Penetration Test Robot Summary
22 APPENDIX A: APPENDIX AKali Linux Desktop at a Glance Downloading and Running a VM of Kali Linux Kali Xfce Desktop Summary
23 APPENDIX B: APPENDIX BBuilding a Lab Environment Using Docker Docker Technology Summary
24 Index
25 Copyright
List of Tables
1 Chapter 1Table 1.1 Tmux Keyboard Shortcuts
2 Chapter 2Table 2.1 Numerical ConditionsTable 2.2 String ConditionsTable 2.3 File/Directory Conditions
3 Chapter 3Table 3.1 OSI LayersTable 3.2 Subnets and CIDRTable 3.3 Common Port NumbersTable 3.4 Nmap Version Intensity
4 Chapter 4Table 4.1 The Most Common Query Criteria Used on the Shodan SiteTable 4.2 Google Dorks Common Queries
5 Chapter 14Table 14.1 CVSS Score Rating
6 Chapter 15Table 15.1 Flag RegistersTable 15.2 Assembly InstructionsTable 15.3 Assembly Jump InstructionsTable 15.4 Assembly InstructionsTable 15.5 Data TypesTable 15.6 Addressing Modes
7 Chapter 17Table 17.1 Arithmetic OperatorsTable 17.2 String FormattersTable 17.3 String FunctionsTable 17.4 Comparision OperatorsTable 17.5 Python Escape Characters
List of Illustrations
1 Chapter 1Figure 1.1 Tmux New WindowFigure 1.2 New Tmux Highlighted TabFigure 1.3 Tmux Vertical Windows Side by SideFigure 1.4 Tmux Horizontal WindowsFigure 1.5 Kali Linux OS Security CommandsFigure 1.6 Kali Linux – Files and Folders CommandsFigure 1.7 USB MountFigure 1.8 Mount Using the Command LineFigure 1.9 “Windows Login”Figure 1.10 SSH with MobaXterm on WindowsFigure